TW201741925A - Staged control release in boot process - Google Patents

Staged control release in boot process Download PDF

Info

Publication number
TW201741925A
TW201741925A TW106105484A TW106105484A TW201741925A TW 201741925 A TW201741925 A TW 201741925A TW 106105484 A TW106105484 A TW 106105484A TW 106105484 A TW106105484 A TW 106105484A TW 201741925 A TW201741925 A TW 201741925A
Authority
TW
Taiwan
Prior art keywords
key
code
authentication
integrity
data
Prior art date
Application number
TW106105484A
Other languages
Chinese (zh)
Inventor
尹赫 車
尤根德拉 夏
勞倫斯 卡斯
Original Assignee
內數位專利控股公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 內數位專利控股公司 filed Critical 內數位專利控股公司
Publication of TW201741925A publication Critical patent/TW201741925A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/108Source integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems
    • H04W84/045Public Land Mobile systems, e.g. cellular systems using private Base Stations, e.g. femto Base Stations, home Node B

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Integrity validation of a network device may be performed. A network device comprising a secure hardware module, may receive a root key. The secure hardware module may also receive a first code measurement. The secure hardware module may provide a first key based on the root key and the first code measurement. The secure hardware module may receive a second code measurement and provide a second key based on the first key and the second code measurement. The release of keys based on code measurements may provide authentication in stages.

Description

啟洞程序中階段控制釋放 Stage control release in the hole opening procedure

相關申請的交叉引用。本申請根據且要求於2010年4月12日提交的申請號61/323,248、2010年6月22日提交的申請號61/357,474的美國臨時專利申請的優先權,這些申請的內容通過引用而被視為在此完全加入。 Cross-reference to related applications. The present application is based on and claims priority to U.S. Provisional Patent Application Serial No. 61/323,248, filed on Jun. It is considered to be fully joined here.

傳統的安全方法可以允許對資源釋放進行二元決策,例如基於重設的成功安全啟動的用於認證的單一密鑰。如果沒有發生重設之後的成功安全啟動,則可能會發生問題。 Traditional security methods can allow for binary decisions on resource release, such as a single key for authentication based on a successful, securely initiated reset. A problem can occur if there is no successful safe start after the reset.

公開了一種系統、方法和工具(instrumentality)來執行網路裝置的完整性確認(validation)。網路裝置可以包括安全記憶體。例如,安全記憶體可以包含在安全硬體模組中。安全記憶體可以接收根密鑰。例如,根密鑰可以在製造或供應時被安全記憶體接收。根密鑰可以儲存在安全記憶體上,並且對於安全硬體模組之外軟體或硬體是不 可見的。 A system, method, and instrumentality is disclosed to perform integrity verification of a network device. The network device can include secure memory. For example, secure memory can be included in a secure hardware module. The secure memory can receive the root key. For example, the root key can be received by secure memory at the time of manufacture or provisioning. The root key can be stored in secure memory and is not software or hardware other than the secure hardware module. visible.

所述安全硬體模組可以接收第一代碼測量(對第一代碼的測量)。例如,處理器(比如與包括安全硬體模組的網路裝置相關聯的處理器)可以選擇代碼的第一部分來測量。代碼的第一部分可以被儲存在與網路裝置相關聯的記憶體上,例如ROM記憶體、RAM記憶體等等。所述處理器可以測量導致第一代碼測量的選擇的代碼的第一部分。所述處理器可以提供該測量給安全硬體模組。 The secure hardware module can receive the first code measurement (measurement of the first code). For example, a processor (such as a processor associated with a network device including a secure hardware module) can select the first portion of the code to measure. The first portion of the code can be stored on a memory associated with the network device, such as ROM memory, RAM memory, and the like. The processor can measure a first portion of the code that results in the selection of the first code measurement. The processor can provide the measurement to the secure hardware module.

所述安全硬體模組可以基於根密鑰和第一代碼測量生成第一密鑰。例如,該安全硬體模組可以得到或釋放第一密鑰。當第一代碼測量有效時,生成的第一密鑰有效,且當第一代碼測量無效時,生成的第一密鑰無效。例如,該安全硬體模組可以部分基於第一代碼測量得到第一密鑰。如果第一代碼測量無效,則得到的第一密鑰也無效。所生成的第一密鑰由該安全硬體模組生成以便提供到資源的存取。當代碼儲存在所述安全記憶體上時,可以在沒有代碼測量的情況下提供到資源的存取。 The secure hardware module can generate the first key based on the root key and the first code measurement. For example, the secure hardware module can obtain or release the first key. When the first code measurement is valid, the generated first key is valid, and when the first code measurement is invalid, the generated first key is invalid. For example, the secure hardware module can obtain the first key based on the first code measurement. If the first code measurement is invalid, the resulting first key is also invalid. The generated first key is generated by the secure hardware module to provide access to the resource. When the code is stored on the secure memory, access to the resource can be provided without code measurement.

所述第一密鑰可以與和第一功能相關聯的信任(trust)的第一階段相關(例如,一個或多個資源可以與第一功能相關聯)。進一步地,第一利益相關方(stakeholder)可以使用該有效的第一密鑰來存取該第一功能。如果該第一密鑰無效,則所述第一利益相關方不可 以存取該第一功能。這就是說,當第一代碼測量無效時,所述安全硬體模組可以阻止對第一功能的存取。 The first key may be associated with a first phase of a trust associated with the first function (eg, one or more resources may be associated with the first function). Further, the first stakeholder can use the valid first key to access the first function. If the first key is invalid, the first stakeholder is not allowed To access the first function. That is to say, when the first code measurement is invalid, the secure hardware module can block access to the first function.

所述安全硬體模組可以接收第二代碼測量(對第二代碼的測量)。該安全硬體模組可以基於第一密鑰和第二代碼測量生成第二密鑰。該第二密鑰可以與和第二功能相關聯的信任的第二階段相關(例如,一個或多個資源可以與第二功能相關聯)。進一步地,第二利益相關方可以使用有效的第二密鑰來存取第二功能。密鑰釋放可以被限制在最後已知的好的啟動階段(例如,最後已知的具有成功認證的啟動階段)。 The secure hardware module can receive a second code measurement (measurement of the second code). The secure hardware module can generate a second key based on the first key and the second code measurement. The second key may be associated with a second phase of trust associated with the second function (eg, one or more resources may be associated with the second function). Further, the second stakeholder can use the valid second key to access the second function. The key release can be limited to the last known good start-up phase (for example, the last known start-up phase with successful authentication).

資源(比如密鑰和基於硬體、代碼、和/或資料的完整性測量的功能)的生成和/或釋放可以階段地提供認證。例如,裝置可以包括若干層,每個層有其自己的認證秘密。每個認證秘密可以對應在裝置能力(比如製造商韌體、可信的執行代碼、作業系統和第三方應用)的層中的特殊的利益相關方。進一步例如,有效的第一密鑰可以與對第一啟動階段的有效認證相關聯。該有效第一密鑰可以被裝置製造商(例如,第一利益相關方)使用來存取網路裝置上的韌體,以在該韌體上執行修復。有效的第二密鑰可以與在隨後的啟動階段(例如,中間的啟動階段)期間對一個或多個軟體元件的有效認證相關聯。該有效的第二密鑰可以被裝置管理者(例如,第二利益相關方)使用來 存取所述軟體元件,例如來執行該軟體的修復。通過對已成功認證的各階段提供有效密鑰,存取可以被許可,其與沒有認證失敗的最後階段相當。 The generation and/or release of resources, such as keys and functions based on hardware, code, and/or data integrity measurements, may provide authentication in stages. For example, a device may include several layers, each layer having its own authentication secret. Each authentication secret may correspond to a particular stakeholder in the layer of device capabilities such as manufacturer firmware, trusted execution code, operating system, and third party applications. Further for example, the valid first key can be associated with valid authentication for the first startup phase. The valid first key can be used by a device manufacturer (eg, a first stakeholder) to access firmware on the network device to perform repairs on the firmware. The valid second key may be associated with valid authentication of one or more software components during a subsequent startup phase (eg, an intermediate startup phase). The valid second key can be used by the device manager (eg, the second stakeholder) Accessing the software component, for example, to perform repair of the software. By providing a valid key for each stage of successful authentication, access can be granted, which is comparable to the final stage without authentication failure.

本申請公開的多階段認證的階段數目可以變化並且不受限制。進一步地,可以提供多個認證途徑。這就是說,在完整性校驗的某個階段,認證可以以不同的方式進行分支(branch)。例如,每個利益相關方可以提供與一個或多個認證階段相關的一個或多個策略。在每個階段,認證可以基於利益相關方的策略以不同的方式分支。利益相關方能夠在外部管理其策略。 The number of stages of multi-stage authentication disclosed herein may vary and is not limited. Further, multiple authentication paths can be provided. That is to say, at some stage of the integrity check, the authentication can be branched in different ways. For example, each stakeholder can provide one or more policies related to one or more certification phases. At each stage, authentication can be branched in different ways based on stakeholder policies. Stakeholders can manage their strategies externally.

100‧‧‧長期演進無線通信系統/存取網路 100‧‧‧Long Term Evolution Wireless Communication System/Access Network

105、E-UTRAN‧‧‧演進型通用陸地無線電存取網路 105. E-UTRAN‧‧‧Evolved Universal Terrestrial Radio Access Network

110、WTRU‧‧‧無線發射接收單元 110, WTRU ‧ ‧ wireless transmitter receiving unit

120、eNB‧‧‧E-UTRAN節點B 120, eNB‧‧‧E-UTRAN Node B

130‧‧‧MME/S-GW 130‧‧‧MME/S-GW

MME‧‧‧移動性管理實體 MME‧‧‧Mobility Management Entity

S-GW‧‧‧服務閘道 S-GW‧‧‧ service gateway

122、HeNB‧‧‧家庭eNB 122. HeNB‧‧‧Home eNB

132、HeNB GW‧‧‧HeNB閘道 132. HeNB GW‧‧‧HeNB gateway

200‧‧‧LTE無線通信系統 200‧‧‧LTE wireless communication system

LTE‧‧‧長期演進 LTE‧‧‧ Long-term evolution

214、219‧‧‧收發器 214, 219‧‧‧ transceiver

216、217、233‧‧‧處理器 216, 217, 233‧‧ ‧ processors

218、221‧‧‧天線 218, 221‧‧ antenna

220‧‧‧電池 220‧‧‧Battery

215、222、234‧‧‧記憶體 215, 222, 234‧‧‧ memory

TrE‧‧‧可信環境 TrE‧‧‧ Trusted Environment

DVF‧‧‧裝置確認功能 DVF‧‧‧ device confirmation function

DAF‧‧‧裝置認證功能 DAF‧‧‧ device authentication function

SPC_DA‧‧‧安全處理能力 SPC_DA‧‧‧Safe handling capacity

Kpriv_DA‧‧‧裝置認證的私有密鑰 Kpriv_DA‧‧‧ device certified private key

DevCert‧‧‧裝置證明 DevCert‧‧‧ device proof

ROM‧‧‧唯讀記憶體 ROM‧‧‧Read-only memory

KDF‧‧‧階段特定密鑰導出功能 KDF‧‧ phase specific key export function

RN‧‧‧中繼節點 RN‧‧‧ relay node

UE‧‧‧使用者設備 UE‧‧‧User equipment

OP‧‧‧營運商 OP‧‧‧ operator

DM‧‧‧裝置管理 DM‧‧‧Device Management

DeNB‧‧‧供給eNB DeNB‧‧‧Supply to eNB

從以下描述中可以更詳細地理解本發明,下面的描述是以實例結合附圖的形式給出的。 The invention can be understood in more detail from the following description, which is given by way of example with reference to the accompanying drawings.

第1圖是示例的長期演進(LTE)無線通信系統圖;第2圖是示例的LTE無線通信系統框圖;第3圖示出了具有裝置確認和裝置認證之間的綁定的示例裝置;第4圖示出了使用公共可信環境(TrE)的認證和完整性校驗之示例物理綁定;第5圖示出了確認和基於預共用秘密的裝置認 證之間的綁定的示例;第6圖示出了確認和基於預共用密鑰的認證的示例;第7圖示出了由TrE許可條件存取導致的綁定的示例;第8圖示出了確認和基於證明的裝置認證之間的綁定的示例;第9圖示出了確認和基於證明的認證的綁定的示例;第10圖示出了由TrE許可條件存取導致的綁定的示例;第11圖示出了使用門控(gating)功能的綁定的示例;第12圖示出了在示例啟動程序相關的多個階段中進行認證的示例;第13A圖示出了可以用來實現公開的系統和方法的實施方式的示例晶片;第13B圖示出了可以用來實現公開的系統和方法的實施方式的示例晶片;第13C圖示出了可以用來實現公開的系統和方法的實施方式的示例晶片;第14圖示出了示例的密鑰導出(derivation)功 能;第15圖示出了示例的密鑰導出細節,包括簽名機制;第16圖示出了示例的多階段密鑰導出細節;第17圖示出了示例的啟動序列;第18圖示出了示例的啟動序列流;第19圖示出了與多階段認證相關的示例網路通信;第20圖示出了示例的啟動和啟動後配置程序;第21圖示出了可以用來實現公開的系統和方法的實施方式的示例晶片;以及第22圖示出了將完整性校驗程序擴展到UE通信的示例。 1 is an exemplary Long Term Evolution (LTE) wireless communication system diagram; FIG. 2 is a block diagram of an exemplary LTE wireless communication system; FIG. 3 is a diagram showing an example apparatus having binding between device acknowledgment and device authentication; Figure 4 shows an example physical binding using authentication and integrity checking for the Common Trusted Environment (TrE); Figure 5 shows the device for confirmation and pre-shared secrets. Example of binding between cards; Figure 6 shows an example of confirmation and authentication based on pre-shared key; Figure 7 shows an example of binding caused by TrE permission conditional access; An example of binding between confirmation and proof-based device authentication is shown; Figure 9 shows an example of binding of validation and proof-based authentication; Figure 10 shows binding caused by TrE permission conditional access An example of the setting; Figure 11 shows an example of binding using a gating function; Figure 12 shows an example of performing authentication in a plurality of stages related to the example startup procedure; Figure 13A shows Example wafers that can be used to implement embodiments of the disclosed systems and methods; FIG. 13B illustrates an example wafer that can be used to implement embodiments of the disclosed systems and methods; FIG. 13C illustrates an example that can be used to implement the disclosure. Example wafer of an embodiment of the system and method; Figure 14 illustrates an example key derivation work Figure 15 shows an example key derivation detail, including a signature mechanism; Figure 16 shows an example multi-stage key derivation detail; Figure 17 shows an example startup sequence; Figure 18 shows an example startup sequence; An example startup sequence flow; Figure 19 shows an example network communication related to multi-stage authentication; Figure 20 shows an example startup and post-boot configuration procedure; Figure 21 shows an example that can be used to implement the disclosure An example wafer of an embodiment of the system and method; and FIG. 22 shows an example of extending the integrity check procedure to UE communication.

附圖可能涉及示例的實施方式,其中公開的系統、方法以及工具可以被實現。然而,雖然本發明與示例實施方式一起描述,但是本發明不限於此,以及應該理解的是,可以使用其他的實施方式或者在所描述的實施方式中做些修改和補充,從而不偏離地執行與本發明相同的功能。一些公開的系統和方法可以提供多階段安全認證。雖然描述一般參照無線裝置和網路,但所公開的系統、方法 和工具不僅限於本申請,並且可適用於能夠實現所公開的認證的任何適當的裝置、網路和/或系統。進一步地,下文公開的多階段認證可以描述與啟動階段的活動相關的多階段認證。然而,描述是為了說明,並且所公開的系統、方法和工具不限於啟動階段的實現。多階段認證,可以廣泛適用於在任何適當的多階段程序中實現。 The drawings may relate to example embodiments in which the disclosed systems, methods, and tools may be implemented. However, although the invention is described in connection with the example embodiments, the invention is not limited thereto, and it should be understood that other embodiments may be used or modified and supplemented in the described embodiments so as not to The same function as the present invention. Some disclosed systems and methods can provide multi-stage security certification. Although the description generally refers to wireless devices and networks, the disclosed systems and methods And tools are not limited to this application, and are applicable to any suitable device, network, and/or system capable of implementing the disclosed authentication. Further, the multi-stage certification disclosed below may describe multi-stage authentication associated with activities in the startup phase. However, the description is for illustration, and the disclosed systems, methods, and tools are not limited to implementations of the startup phase. Multi-stage certification can be broadly applied to any appropriate multi-stage program.

當在下文中提及時,術語“無線發射/接收單元(WTRU)”包括但不侷限於使用者設備(UE)、移動站、高級移動站(AMS)、站台(STA)、固定或移動用戶單元、傳呼機、行動電話、個人數位助理(PDA)、電腦、或能在無線環境中運行的任何其他類型的裝置。術語WTRU和UE可以互換使用。當在下文中提及時,術語“基地台”包括但不侷限於節點-B、高級基地台(ABS)、站點控制器、存取點(AP)、家庭節點B(HnB)或能在無線環境中運行的任何其他類型的周邊設備。術語“WTRU”和“基地台”不互斥。 As referred to hereinafter, the term "wireless transmit/receive unit (WTRU)" includes but is not limited to user equipment (UE), mobile station, advanced mobile station (AMS), station (STA), fixed or mobile subscriber unit, Pager, mobile phone, personal digital assistant (PDA), computer, or any other type of device that can operate in a wireless environment. The terms WTRU and UE are used interchangeably. As referred to hereinafter, the term "base station" includes but is not limited to Node-B, Advanced Base Station (ABS), Site Controller, Access Point (AP), Home Node B (HnB), or in a wireless environment. Any other type of peripheral device that is running in. The terms "WTRU" and "base station" are not mutually exclusive.

第1圖是長期演進(LTE)無線通信系統/存取網路100的示例圖,其包括演進型通用陸地無線電存取網路(E-UTRAN)105。EUTRAN 105可以包括多個E-UTRAN節點B(eNB)120、家庭eNB(HeNB)122和HeNB閘道(HeNB GW)132。WTRU 110可以與eNB 120、HeNB 122或與二者都進行通信。eNB 120可以使用X2介面而互為介面。每個eNB 120和HeNB GW 132可以通過S1介面而為移動性管理 實體(MME)/服務閘道(S-GW)130的介面。HeNB 122可以通過S1介面而為HeNB GW 132的介面,通過S1介面而為MME/S-GW 130的介面,或者為二者的介面。雖然第1圖中只示出了一個WTRU 110、一個HeNB和三個eNB 120,但很明顯的是,無線和有線裝置的任何組合可以被包括在該無線通信系統/存取網路100中。 1 is an illustration of a Long Term Evolution (LTE) wireless communication system/access network 100 that includes an Evolved Universal Terrestrial Radio Access Network (E-UTRAN) 105. The EUTRAN 105 may include a plurality of E-UTRAN Node Bs (eNBs) 120, a Home eNB (HeNB) 122, and a HeNB Gateway (HeNB GW) 132. The WTRU 110 may communicate with the eNB 120, the HeNB 122, or both. The eNBs 120 can interface with each other using the X2 interface. Each eNB 120 and HeNB GW 132 can be mobility managed through the S1 interface. The interface of the entity (MME) / service gateway (S-GW) 130. The HeNB 122 can be the interface of the HeNB GW 132 through the S1 interface, the interface of the MME/S-GW 130 through the S1 interface, or the interface between the two. Although only one WTRU 110, one HeNB, and three eNBs 120 are shown in FIG. 1, it will be apparent that any combination of wireless and wired devices can be included in the wireless communication system/access network 100.

第2圖是LTE無線通信系統200的示例框圖,其包括WTRU 110、eNB 120以及MME/SGW 130。雖然eNB 120和MME/S-GW 130簡單地示出,但很明顯的是,HeNB 122和HeNB GW 132的示例可以包括實質上相似的特徵。如第2圖所示,WTRU 110、eNB 120和MME/S-GW 130可以被配置成支援移動引發的節能模式。 2 is an example block diagram of an LTE wireless communication system 200 that includes a WTRU 110, an eNB 120, and an MME/SGW 130. While eNB 120 and MME/S-GW 130 are shown simply, it will be apparent that examples of HeNB 122 and HeNB GW 132 may include substantially similar features. As shown in FIG. 2, WTRU 110, eNB 120, and MME/S-GW 130 may be configured to support a mobility induced power save mode.

除了在典型的WTRU中可以找到的元件外,WTRU 110還可以包括帶有可選鏈結記憶體222的處理器216、至少一個收發器214、可選電池220以及天線218。處理器216可以被配置成執行頻寬管理。收發器214可以與處理器216和天線218通信以促進無線通信的發送和接收。可選電池220可以被用在WTRU 110中來給收發器214和處理器216供電。 In addition to the elements that can be found in a typical WTRU, the WTRU 110 may also include a processor 216 with optional link memory 222, at least one transceiver 214, an optional battery 220, and an antenna 218. Processor 216 can be configured to perform bandwidth management. Transceiver 214 can communicate with processor 216 and antenna 218 to facilitate the transmission and reception of wireless communications. An optional battery 220 can be used in the WTRU 110 to power the transceiver 214 and the processor 216.

除了在典型的eNB中可以找到的元件外,eNB 120還可以包括帶有可選鏈結記憶體215的處理器217、收發器219以及天線221。處理器217可以被配置成執行頻寬管理。收發器219可以與處理器217和天線221通信以促進無線通信的發送和接收。eNB 120可以連接到移動性管理實體/ 服務閘道(MME/S-GW)130,其可以包括帶有可選鏈結記憶體234的處理器233。 In addition to the elements that can be found in a typical eNB, the eNB 120 may also include a processor 217 with an optional link memory 215, a transceiver 219, and an antenna 221. Processor 217 can be configured to perform bandwidth management. Transceiver 219 can communicate with processor 217 and antenna 221 to facilitate the transmission and reception of wireless communications. The eNB 120 can connect to the mobility management entity / A service gateway (MME/S-GW) 130, which may include a processor 233 with optional link memory 234.

第1圖和第2圖示出的LTE網路只是特殊的通信網路的一個例子,且其他類型的通信網路可被使用。多樣的實施方式可以在任何無線通信技術中實現。一些無線通信技術的實例類型包括但不限於全球互通微波存取(WiMAX)、802.xx、全球移動通信系統(GSM)、分碼多重存取(CDMA2000)、通用移動電信系統(UMTS)或任何未來技術。 The LTE network shown in Figures 1 and 2 is just one example of a particular communication network, and other types of communication networks can be used. A variety of implementations can be implemented in any wireless communication technology. Some examples of wireless communication technologies include, but are not limited to, Worldwide Interoperability for Microwave Access (WiMAX), 802.xx, Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA2000), Universal Mobile Telecommunications System (UMTS), or any Future technology.

當在下文中提及時,術語“巨集胞元”包括但不限於基地台、E-UTRAN節點B(eNB)或能夠在無線環境中運行的任何其他類型的介面裝置。當在下文中提及時,術語“家庭節點B(HNB)”包括但不限於基地台、家庭演進型節點B(HeNB)、毫微微胞元或能夠在封閉的用戶群無線環境中運行的任何其他類型的介面裝置。 As referred to hereinafter, the term "macrocell" includes, but is not limited to, a base station, an E-UTRAN Node B (eNB), or any other type of interface device capable of operating in a wireless environment. As referred to hereinafter, the term "Home Node B (HNB)" includes, but is not limited to, a base station, a Home evolved Node B (HeNB), a femtocell, or any other type capable of operating in a closed subscriber group wireless environment. Interface device.

為達到解釋的目的,在長期演進(LTE)語境中描述了多種實施方式,但這些實施方式也可以在任何無線通信技術中實現。一些無線通信技術的實例類型包括但不限於全球互通微波存取(WiMAX)、802.xx、全球移動通信系統(GSM)、分碼多重存取(CDMA2000)、通用移動電信系統(UMTS)或任何未來技術。 For the purposes of explanation, various embodiments are described in the Long Term Evolution (LTE) context, but these embodiments can also be implemented in any wireless communication technology. Some examples of wireless communication technologies include, but are not limited to, Worldwide Interoperability for Microwave Access (WiMAX), 802.xx, Global System for Mobile Communications (GSM), Code Division Multiple Access (CDMA2000), Universal Mobile Telecommunications System (UMTS), or any Future technology.

術語用戶端和裝置(device)可以被同義使用。另外,術語“裝置完整性確認”、“裝置確認”以及“確認”也可以被同義使用。“確認”可以是檢驗共同構成通 信或計算裝置的部分或全部元件的完整性的程序。部分或全部元件可以是,例如,硬體(HW)、軟體(SW)、韌體(FW)和/或配置資料。裝置認證可以是指通信或計算裝置的身份針對驗證方被檢驗其真實性的程序。 The terms client and device can be used synonymously. In addition, the terms "device integrity confirmation", "device confirmation", and "confirmation" may also be used synonymously. "confirmation" can be a test A procedure for the integrity of a letter or computing part or all of a component. Some or all of the components may be, for example, hardware (HW), software (SW), firmware (FW), and/or configuration information. Device authentication may refer to a procedure in which the identity of a communication or computing device is verified against the authenticator for authenticity.

在H(e)NB的語境中,可以執行綁定的程序,例如將H(e)NB的裝置完整性確認的結果與裝置認證的程序或結果進行綁定。有多種方式可以用來執行裝置確認和裝置認證之間的綁定。 In the context of H(e)NB, a binding procedure can be performed, such as binding the result of the device integrity verification of the H(e)NB with the program or result of the device authentication. There are several ways to perform the binding between device acknowledgment and device authentication.

雖然應用於裝置完整性確認和裝置認證的綁定方法的示例是用於3GPP H(e)NB的,但可以理解的是,這些方法可以應用於需要裝置完整性確認和裝置認證的任何其他通信或應用裝置。 Although an example of a binding method applied to device integrity confirmation and device authentication is for 3GPP H(e)NB, it will be appreciated that these methods can be applied to any other communication requiring device integrity confirmation and device authentication. Or application device.

在H(e)NB中典型的裝置認證程序可能侷限於驗證包含在可信環境(TrE)中的AKA證書(credential)。這些程序可能不會解決裝置認證或確認,以及/或者將主機(hosting party)認證綁定到裝置認證的可能性。 A typical device authentication procedure in H(e)NB may be limited to verifying AKA certificates contained in a Trusted Environment (TrE). These programs may not address device authentication or acknowledgment, and/or the possibility of binding hosting party authentication to device authentication.

可以執行經過確認的裝置與裝置認證的程序和/或結果之間的綁定。可以執行兩種類型的綁定。在邏輯綁定中,可以聲明和驗證用在或用於裝置確認程序中的邏輯實體(或多個邏輯實體或程序或資料)和用於裝置認證程序的邏輯實體(或多個邏輯實體或程序或資料)之間的邏輯對應。在物理綁定中,用在或用於裝置確認程序的特定物理實體(比如物理TrE和/或其擁有的特定秘密或密鑰)可以與用在或用於裝置認證程序的物理實體(比如應用軟 體檔或資料或密鑰)有直接的對應關係。 Binding between the confirmed device and the device certified program and/or results can be performed. Two types of bindings can be performed. In a logical binding, a logical entity (or multiple logical entities or programs or materials) used in or for device validation procedures and a logical entity (or multiple logical entities or programs) for device authentication procedures can be declared and verified. Or logical correspondence between data. In physical binding, a specific physical entity (such as a physical TrE and/or a specific secret or key it owns) used in or for device validation procedures may be associated with a physical entity (such as an application) used in or for device authentication procedures. soft There is a direct correspondence between the file or the data or the key.

第3圖示出了表示為裝置功能的兩種不同類型的綁定。在兩個示例中,實際的裝置完整性確認程序可以由可信實體執行,例如安全地嵌入裝置中的基於硬體的安全環境。在H(e)NB語境中,比如可信實體可以指H(e)NB的TrE。第4圖是使用公共TrE綁定機制的圖,其執行1)裝置的完整性校驗和2)裝置認證的嚴格或敏感功能。 Figure 3 shows two different types of bindings represented as device functions. In both examples, the actual device integrity validation procedure can be performed by a trusted entity, such as a hardware-based security environment that is securely embedded in the device. In the H(e)NB context, for example, a trusted entity may refer to the TrE of H(e)NB. Figure 4 is a diagram of a common TrE binding mechanism that performs 1) integrity verification of the device and 2) strict or sensitive functionality of device authentication.

在第4圖中,安全和可信的TrE可以位於通信或計算裝置中。TrE可以執行一個或多個以下的功能。裝置完整性校驗,比如裝置完整性確認,其中這種確認可以在裝置上本地執行。TrE可以包括第4圖的介面(1)以及存取和使用用於確認的證書的能力,其儲存在TrE中或由TrE儲存。TrE可以確保請求安全處理的裝置認證程序的部分的安全,其包括第4圖的介面(3)和存取和使用秘密證書來進行裝置認證的能力,其儲存在TrE中或由TrE儲存。其他能力可以包括執行安全處理來支援位於TrE之外的請求安全敏感處理的應用。這些應用可以存取或使用它們自己的秘密證書(第4圖中未示出)。TrE可以包括到位於TrE之外的裝置功能/應用的介面。例如包括但不侷限於第4圖中的用於在裝置上進行裝置認證處理的介面(2)和/或第4圖中的用於來自TrE內部請求安全處理的其他非認證應用介面(5)。 In Figure 4, the secure and trusted TrE can be located in a communication or computing device. The TrE can perform one or more of the following functions. Device integrity check, such as device integrity confirmation, where such acknowledgement can be performed locally on the device. The TrE may include the interface (1) of Figure 4 and the ability to access and use certificates for validation, stored in the TrE or stored by the TrE. The TrE can secure the portion of the device authentication program that requests secure processing, including the interface (3) of Figure 4 and the ability to access and use secret certificates for device authentication, stored in the TrE or stored by the TrE. Other capabilities may include performing secure processing to support applications that are requesting security sensitive processing outside of the TrE. These applications can access or use their own secret certificates (not shown in Figure 4). The TrE can include an interface to device functions/applications located outside of the TrE. For example, but not limited to, the interface (2) for performing device authentication processing on the device in FIG. 4 and/or the other non-authentication application interface for internal security request processing from the TrE in the fourth figure (5) .

另外,裝置的非TrE部分可以執行一個或多個下列類型的功能。一個功能可以是裝置認證功能的非安全 部分。另一個功能可以用於不需要從TrE請求安全處理的應用。另一個功能可以用於需要從TrE請求安全處理的應用(除了裝置認證)。裝置的非TrE部分可以支援介面,包括第4圖的用於裝置認證、裝置能力(d)和/或基於網路的AAA伺服器(g)之間消息交換的介面(4)。第4圖的介面(6)可以用於針對請求來自裝置側的TrE內的安全處理的功能的消息交換。第4圖的介面(7)可以用於針對不請求來自裝置側的TrE內的安全處理的功能的消息交換。用於裝置認證的證書和用於裝置完整性確認的證書可以不相同。然而,這些證書可以被配置成互相綁定。 Additionally, the non-TrE portion of the device can perform one or more of the following types of functions. A feature can be non-secure for device authentication section. Another feature can be used for applications that do not require secure processing from the TrE. Another feature can be used for applications that require secure processing from the TrE (except device authentication). The non-TrE portion of the device can support the interface, including the interface (4) for message exchange between device authentication, device capability (d), and/or network-based AAA server (g) in FIG. The interface (6) of Fig. 4 can be used for message exchange for requesting functions from secure processing within the TrE on the device side. The interface (7) of Fig. 4 can be used for message exchange for not requesting functions from secure processing within the TrE on the device side. The certificate for device authentication and the certificate for device integrity confirmation may be different. However, these certificates can be configured to be bound to each other.

第4圖是可以在H(e)NB中使用物理綁定的裝置示例。例如,通過使用TrE進行確認和裝置認證可以執行物理綁定。例如,在H(e)NB中,TrE可以被設計成執行裝置確認所需的全部程序。這些程序可以包括需要對裝置認證所需的程序進行最安全或最可信處理的程序的至少一部分或者整個程序本身。舉例來講,如果裝置認證協定被設計成使用基於預共用密鑰的方式,比如EAP-AKA,則持有AKA證書的TrE以及H(e)NB可以被進一步互相綁定。例如,H(e)NB可以對計算用於裝置認證的AKA證書所需的資料進行加密,以使得在傳送資料到TrE之前將解密限制於TrE。TrE可以安全地儲存解密該資料所需的密鑰。另外,通過結合公共安全協定(比如IKEv2)的同一會話中的關於裝置確認和裝置認證的資訊,可以得到進一步的綁定。在這種情況下,適於這種綁定的裝置確認可以使得:在H(e)NB(以 及它的TrE)和網路實體之間其需要某個互動和消息交換。 Figure 4 is an example of a device that can use physical binding in H(e)NB. For example, physical binding can be performed by using TrE for acknowledgment and device authentication. For example, in H(e)NB, the TrE can be designed to perform all the procedures required for device validation. These programs may include at least a portion of the program that requires the most secure or trusted processing of the program required for device authentication or the entire program itself. For example, if the device authentication protocol is designed to use a pre-shared key based approach, such as EAP-AKA, the TrE and H(e)NB holding the AKA certificate can be further bound to each other. For example, the H(e)NB may encrypt the data required to calculate the AKA certificate for device authentication so that the decryption is limited to TrE before transmitting the data to the TrE. The TrE can securely store the keys needed to decrypt the data. In addition, further binding can be obtained by combining information about device acknowledgment and device authentication in the same session of a public safety agreement (such as IKEv2). In this case, the device confirmation suitable for this binding can make: at H(e)NB (in And its TrE) and the network entity need an interaction and message exchange.

如前文所述,邏輯綁定是可以被用於裝置確認和認證的另一種類型的綁定。邏輯綁定的示例可以是使用相同的封包、消息、會話或相同或公共通信協定消息的連續會話來執行為了裝置確認和裝置認證的目的而需要被轉移出裝置的消息。應該注意的是,物理綁定方法和邏輯綁定方法可以被互相結合使用。 As mentioned earlier, logical binding is another type of binding that can be used for device validation and authentication. An example of a logical binding may be to use a continuous session of the same packet, message, session, or same or common communication protocol message to perform a message that needs to be transferred out of the device for purposes of device validation and device authentication. It should be noted that the physical binding method and the logical binding method can be used in combination with each other.

裝置確認可以被綁定於基於預共用秘密的用戶端認證。 Device acknowledgment can be tied to client-side authentication based on pre-shared secrets.

可以執行H(e)NB的裝置確認,以便以下列物理和/或邏輯綁定機制中的一個或任何結合的方式綁定到基於預共用密鑰的認證。通過使用用於可信環境(TrE)和其餘的H(e)NB之間的消息交換的加密密鑰和證書將TrE物理綁定到H(e)NB,至少可以在TrE和H(e)NB內部保護該密鑰和證書。這可以為了裝置認證而應用於TrE和H(e)NB之間的消息交換。 The device acknowledgment of the H(e)NB may be performed to bind to the pre-shared key based authentication in one or any combination of the following physical and/or logical binding mechanisms. Physically bind the TrE to the H(e)NB by using an encryption key and certificate for message exchange between the Trusted Environment (TrE) and the rest of the H(e)NB, at least in TrE and H(e) The NB internally protects the key and certificate. This can be applied to message exchange between TrE and H(e)NB for device authentication.

參考第5圖,TrE可以先校驗H(e)NB的完整性。如果成功,其可以進行到第5圖的連線(2);如果不成功,TrE不能進行到連線(2),但反而會鎖定功能,其可能包括H(e)NB的裝置認證功能。為了校驗H(e)NB的完整性,TrE可以使用儲存在TrE中的裝置確認證書(參見第5圖中的連線(1))。 Referring to Figure 5, the TrE can first verify the integrity of the H(e)NB. If successful, it can proceed to the connection (5) of Figure 5; if unsuccessful, the TrE cannot proceed to the connection (2), but instead locks the function, which may include the device authentication function of the H(e)NB. To verify the integrity of the H(e)NB, the TrE can confirm the certificate using the device stored in the TrE (see wire (1) in Figure 5).

在連線(2),可以對TrE裝備密鑰對,該密鑰對的私有部分安全地儲存在TrE內,且公共部分則對H(e)NB 是可用的。H(e)NB的製造者可以生成該密鑰對,並且提供使公共密鑰針對H(e)NB可用所需的證明(certificate)。TrE的裝置確認功能可以使用TrE私有密鑰來對消息進行簽名(在第5圖描繪的連線(2)中),以向TrE之外的裝置認證功能指示以下中的一個或多個,例如:TrE的ID、指示TrE已經成功驗證了其餘H(e)NB的完整性的消息、和/或指示TrE授權裝置認證功能且可以被授權進行裝置認證程序的授權資料。TrE私有密鑰可以被用於對該授權消息進行簽名。通過H(e)NB裝置上的裝置認證功能,該授權消息可以授權對TrE的一些安全處理能力的使用。 In connection (2), the TrE can be equipped with a key pair, the private part of the key pair is securely stored in the TrE, and the public part is paired with H(e)NB It's useful. The manufacturer of the H(e)NB can generate the key pair and provide the certificate required to make the public key available to the H(e)NB. The device confirmation function of the TrE may use a TrE private key to sign the message (in the connection (2) depicted in Figure 5) to indicate one or more of the following to the device authentication function other than the TrE, for example : ID of the TrE, a message indicating that the TrE has successfully verified the integrity of the remaining H(e)NBs, and/or an authorization material indicating that the TrE authorizes the device authentication function and can be authorized to perform the device authentication procedure. The TrE private key can be used to sign the authorization message. The authorization message can authorize the use of some of the security processing capabilities of the TrE through the device authentication function on the H(e)NB device.

從TrE到TrE之外的裝置認證的被簽名消息傳遞可以被第5圖的連線(3)描繪。H(e)NB可以使用其可能需要驗證以上連線(2)中描述的簽名的TrE公共密鑰。公共密鑰可以是在證明中預先提供的,否則是在其使用之前才對裝置認證功能可用的。公共密鑰的使用可以由第5圖的連線(4)描繪。 The signed message delivery authenticated by devices other than TrE to TrE can be depicted by the line (3) of Figure 5. The H(e)NB may use a TrE public key that it may need to verify the signature described in the above connection (2). The public key may be pre-provisioned in the certificate, otherwise it is available to the device authentication function prior to its use. The use of the public key can be depicted by the line (4) of Figure 5.

裝置認證功能可以使用用於TrE之內的裝置認證的安全處理能力(對後者執行可能是裝置認證程序所需的安全敏感功能)。用於請求和獲得該服務的介面在第5圖的連線(5)中描繪。用於裝置認證的安全處理能力可以使用預先儲存在TrE中的秘密裝置認證證書來計算裝置認證功能可能需要發送給AAA伺服器的資料,以使後者對H(e)NB裝置授權。這可以在第5圖的連線(6)中描繪。 The device authentication function may use the secure processing capabilities for device authentication within the TrE (the latter performing security sensitive functions that may be required for device authentication procedures). The interface for requesting and obtaining the service is depicted in the line (5) of Figure 5. The secure processing capability for device authentication may use the secret device authentication credentials pre-stored in the TrE to calculate the device authentication function that may need to be sent to the AAA server for the latter to authorize the H(e)NB device. This can be depicted in the line (6) of Figure 5.

裝置認證功能可以與AAA伺服器交換資料,其 中包括從由TrE提供的用於裝置認證的自安全處理能力計算的資料,使得AAA伺服器可以認證H(e)NB裝置的身份。這可以由第5圖的連線(7)描繪。該功能可以在合適的消息交換協定中進行。例如,在H(e)NB情況中,可以考慮諸如IKEv2、TLS、TR069(應用層協定)、OMA-DM協定、或更高層的協定(比如HTTPS)的協定。應該注意的是,裝置認證功能可以自身執行安全敏感功能。 Device authentication function can exchange data with AAA server, Included from the self-secure processing capability calculations provided by the TrE for device authentication, enables the AAA server to authenticate the identity of the H(e)NB device. This can be depicted by the line (7) of Figure 5. This feature can be done in a suitable message exchange agreement. For example, in the case of H(e)NB, protocols such as IKEv2, TLS, TR069 (application layer agreement), OMA-DM protocol, or higher layer protocols (such as HTTPS) may be considered. It should be noted that the device authentication function can perform security sensitive functions by itself.

通過使H(e)NB和TrE使用相同的封包或相同的消息共同執行裝置確認程序和認證程序的指定部分,可以對確認和裝置認證進行綁定。這可以在公共通信會話或公共安全協定的連續會話中執行。該協定的示例可以包括IKEv2協定、TLS、TR069、OMA-DM和HTTPS。該協定可以使用基於預共用秘密的協定、基於非對稱密鑰的協定、基於對稱密鑰的協定等。 The acknowledgment and device authentication can be bound by having H(e)NB and TrE jointly execute the device validation procedure and the specified portion of the authentication procedure using the same packet or the same message. This can be performed in a continuous session of a public communication session or a public safety agreement. Examples of the agreement may include IKEv2 protocol, TLS, TR069, OMA-DM, and HTTPS. The agreement may use protocols based on pre-shared secrets, agreements based on asymmetric keys, protocols based on symmetric keys, and the like.

第6圖是這種綁定機制的示例,其中確認資料和部分認證資料可以在相同的協定/會話/消息中發送。在第6圖中,連線(1)示出了TrE內的裝置確認功能(DVF)可以使用裝置確認證書來執行必要的裝置完整性校驗,以驗證H(e)NB元件的完整性是否得到維持。注意到DVF可以使用TrE的加密能力(TCC)所提供的功能來執行一些裝置完整性校驗和驗證所需的功能。該關係可以由第6圖的點線(A)描繪。 Figure 6 is an example of such a binding mechanism where the validation data and partial authentication material can be sent in the same agreement/session/message. In Figure 6, the connection (1) shows that the device acknowledgment function (DVF) within the TrE can use the device acknowledgment certificate to perform the necessary device integrity check to verify the integrity of the H(e)NB component. It is maintained. Note that DVF can use the functionality provided by TrE's Encryption Capability (TCC) to perform some of the functions required for device integrity verification and verification. This relationship can be depicted by the dotted line (A) of Figure 6.

一段時間後,H(e)NB之內的裝置認證功能(DAF)可以執行程序,比如Diffie-Hellmann(D-H)程序, 以建立用於它自身和外部AAA伺服器之間的加密和簽名的未認證共用密鑰。由連線(7-a)描繪的該步驟,可以是裝置認證的先驅步驟,並且可以建立非認證加密密鑰,以在將遵循的裝置認證消息協定中使用。注意到DAF可以取決於TrE的加密能力(TCC)來執行D-H程序需要的一些臨時(interim)步驟。點線(C)可以是DAF和TCC之間的介面,DAF可以使用該介面來從TCC請求和獲得加密服務。 After a period of time, the device authentication function (DAF) within the H(e)NB can execute programs, such as the Diffie-Hellmann (D-H) program. To establish an unauthenticated common key for encryption and signature between itself and the external AAA server. This step, depicted by the connection (7-a), can be a pioneering step of device authentication, and a non-authenticated encryption key can be established for use in the device authentication message protocol to be followed. Note that the DAF can perform some interim steps required by the D-H program depending on the TrE's Encryption Capability (TCC). The dotted line (C) can be an interface between the DAF and the TCC, which the DAF can use to request and obtain cryptographic services from the TCC.

DAF可以通過發送Dev_Auth_Init_Request消息給AAA伺服器來發起裝置認證程序。例如,如果使用IKEv2協定,則該消息可以在IKE_SA_INIT請求消息中被承載。在該Dev_Auth_Init_Request消息中,DAF可以包括標頭(HDR)、能夠向AAA伺服器提供例如安全參數索引(SPI)等的安全關聯(SA)、由D-H程序生成的伺服器的公共密鑰KE_DH、和/或裝置自身的ID Dev_ID。該步驟在第6圖的連線(7-b)中描繪。 The DAF can initiate a device authentication procedure by sending a Dev_Auth_Init_Request message to the AAA server. For example, if the IKEv2 protocol is used, the message can be hosted in the IKE_SA_INIT request message. In the Dev_Auth_Init_Request message, the DAF may include a header (HDR), a security association (SA) capable of providing, for example, a security parameter index (SPI) to the AAA server, a public key KE_DH of the server generated by the DH program, and / or the device's own ID Dev_ID. This step is depicted in the line (7-b) of Figure 6.

AAA伺服器可以向裝置的DAF發送Dev_Auth_Init_Response(如果使用IKEv2協定,則是IKE_SA_INIT回應消息)。該消息可以包括資訊元素,比如頭(HDR)、由D-H程序生成的裝置公共密鑰KE_DH、以及伺服器自身的ID Syr_ID。該步驟在第6圖的連線(7-c)中描繪。 The AAA server can send Dev_Auth_Init_Response to the device's DAF (or IKE_SA_INIT response message if the IKEv2 protocol is used). The message may include information elements such as a header (HDR), a device public key KE_DH generated by the D-H program, and an ID Syr_ID of the server itself. This step is depicted in the line (7-c) of Figure 6.

DAF可以在Dev_Auth_Request消息(如果選擇IKEv2協定,則是IKE_AUTH請求消息)中向AAA伺服器發送元素,比如標頭、SA、Dev_ID、配置(CONFIG)、和/ 或可選的伺服器證明請求(Svr_Cer_REQ),如第6圖的連線(7-d)所示。注意到,從這裏開始,一些資訊元素可以被D-H程序所生成的密鑰的加密和簽名保護。例如Dev_ID、Session_ID、CONFIG和可選的伺服器證明請求都可以通過使用D-H程序生成的密鑰而對機密性和完整性進行保護。注意到DAF可以使用TrE的加密能力(TCC)來執行使用D-H生成的密鑰的加密和簽名。該關係可以在第6圖的連線(B)中描繪。 The DAF can send elements to the AAA server in the Dev_Auth_Request message (if the IKEv2 protocol is selected, the IKE_AUTH request message), such as header, SA, Dev_ID, configuration (CONFIG), and / Or an optional server certificate request (Svr_Cer_REQ), as shown in Figure 6 (d-d). Note that from here on, some information elements can be protected by the encryption and signature of the keys generated by the D-H program. For example, Dev_ID, Session_ID, CONFIG, and optional server certificate requests can protect confidentiality and integrity by using keys generated by D-H programs. Note that the DAF can use the TrE's Encryption Capability (TCC) to perform encryption and signature of keys generated using D-H. This relationship can be depicted in the line (B) of Figure 6.

AAA伺服器可以向DAF發送Dev_Auth_Response消息(如果使用IKEv2協定,則其是IKE_AUTH回應消息),包括比如標頭、Syr_ID、Session_ID、以及可選的伺服器證明(Svr_Crt)(如果DAF有請求一個的話)、基於H(e)NB和AAA伺服器之間的共用認證秘密(第6圖中儲存在TrE中)的認證挑戰(Auth-Challenge)。這在第6圖的連線(7-e)中描繪。 The AAA server can send a Dev_Auth_Response message to the DAF (if the IKEv2 protocol is used, it is an IKE_AUTH response message), including, for example, the header, Syr_ID, Session_ID, and optional server certificate (Svr_Crt) (if the DAF has requested one) An authentication challenge (Auth-Challenge) based on the shared authentication secret between the H(e)NB and the AAA server (stored in the TrE in FIG. 6). This is depicted in the line (7-e) of Figure 6.

DAF可以向AAA伺服器發送Dev_Auth_Request消息(如果使用IKEv2協定,則其是IKE_AUTH請求消息),該消息可以包括,比如標頭、Dev_ID、Session_ID、Authentication-Challenge回應(AUTH)和/或確認資料(Validation_Data)。這在第6圖的連線(7-f)中描繪。注意到,DAF可以依靠TrE中的用於裝置認證的安全處理能力(SPC_DA)來計算和轉發AUTH,如第6圖的連線(3)所示。注意到SPC_DA可以使用儲存在TrE中的預共用的認證秘密證書來計算AUTH,如第6圖的連線(4)所示。另外, SPC_DA可以依靠TrE的加密能力(TCC)(參見點線(C))。注意到,SPC可以計算AUTH。裝置確認功能(DVF)也可以在轉發Validation_Data給DAF之前使用TrE私有密鑰對Validation_Data以及任何其他相關的補充資料進行簽名,如第6圖的連線(5)所示。DVF和TrE私有密鑰之間的介面可以被用來在將其轉發給DAF之前對確認資料進行簽名,如連線(2)所示。在該實例中,除了使用公共TrE和其資產來執行確認和裝置認證(或者其一些要求安全的部分)的物理綁定之外,另一個邏輯綁定機制也可以被使用。相同的協定,相同的會話,以及相同的消息可以被用來發送關於從裝置到AAA伺服器的裝置確認(即,Validation_Data)和裝置認證(即,AUTH)兩者的結果的資訊元素。 The DAF may send a Dev_Auth_Request message to the AAA server (if the IKEv2 protocol is used, it is an IKE_AUTH request message), which may include, for example, a header, a Dev_ID, a Session_ID, an Authentication-Challenge response (AUTH), and/or a confirmation data (Validation_Data). ). This is depicted in the line (7-f) of Figure 6. It is noted that the DAF can rely on the secure processing capability (SPC_DA) for device authentication in the TrE to calculate and forward the AUTH, as shown in the connection (3) of Figure 6. Note that SPC_DA can calculate the AUTH using the pre-shared authentication secret certificate stored in the TrE, as shown in the connection (4) of Figure 6. In addition, SPC_DA can rely on TrE's Encryption Capability (TCC) (see dotted line (C)). Note that SPC can calculate AUTH. The Device Confirmation Function (DVF) can also sign the Validation_Data and any other related supplemental material using the TrE private key before forwarding the Validation_Data to the DAF, as shown in Figure 6 (5). The interface between the DVF and the TrE private key can be used to sign the confirmation data before forwarding it to the DAF, as shown by the connection (2). In this example, in addition to the physical binding of the public TrE and its assets to perform validation and device authentication (or some of its required security), another logical binding mechanism can be used. The same protocol, the same session, and the same message can be used to send information elements about the results of both device acknowledgment (ie, Validation_Data) and device authentication (ie, AUTH) from the device to the AAA server.

AAA在從先前的Dev_Auth_Request消息(見第6圖)中接收和估計AUTH參數和Validation_Data之後,可以發送Dev_Auth_Response消息來向裝置的DAF指示AAA伺服器存取認證成功與否。這在第6圖的連線(7-g)中描繪。 After receiving and estimating the AUTH parameter and Validation_Data from the previous Dev_Auth_Request message (see Figure 6), the AAA may send a Dev_Auth_Response message to indicate to the device's DAF whether the AAA server access authentication is successful or not. This is depicted in the line (7-g) of Figure 6.

在綁定的機制中,TrE可以向DAF或SPC_DA控制和釋放到敏感功能或敏感資料的存取,該敏感功能或敏感資料是計算認證的成功完成的必要輸出所需的,這能以首先成功完成的裝置確認程序為條件,以使得存取能夠被允許。這種類型的綁定機制既可以被認為是物理綁定機制也可以被認為是邏輯綁定機制。第7圖是這種綁定機制的示 例圖。 In the binding mechanism, the TrE can control and release access to sensitive functions or sensitive data to the DAF or SPC_DA, which is required to calculate the necessary output for successful completion of the authentication, which can be successful first. The completed device validation procedure is conditional so that access can be allowed. This type of binding mechanism can be considered both a physical binding mechanism and a logical binding mechanism. Figure 7 is an illustration of this binding mechanism examples.

參考第7圖,根據允許存取到TrE持有的一些功能或資料,DVF可以執行兩種類型的門控(gating)程序。門控程序可以取決於裝置完整性確認結果的狀態。如果裝置完整性確認結果不成功,DVF可以阻止DAF存取TrE中的SPC_DA,如第7圖的連線(A:門控)所示。DVF可以阻止SPC_DA存取執行到AAA伺服器的成功認證所需的裝置認證證書。這種類型的門控功能可以提供裝置確認和裝置認證之間的其他類型的邏輯綁定。 Referring to Figure 7, DVF can perform two types of gating programs depending on the functions or materials that are allowed to access the TrE. The gating program can depend on the status of the device integrity confirmation results. If the device integrity confirmation result is unsuccessful, the DVF can prevent the DAF from accessing the SPC_DA in the TrE, as shown in Figure 7 (A: Gating). The DVF can prevent the SPC_DA from accessing the device authentication certificate required to perform a successful authentication to the AAA server. This type of gating function can provide other types of logical binding between device acknowledgment and device authentication.

裝置確認可以綁定到認證,比如基於證明的裝置認證。 Device validation can be tied to authentication, such as certificate-based device authentication.

H(e)NB的裝置確認可以被綁定到基於證明的用戶端上並且可以使用上文描述類似機制取得認證。一些可能的機制描述如下。第8圖是使用物理綁定的示例圖,公共TrE可以執行裝置完整性校驗和確認,也可以執行裝置認證要求的一些或全部功能。例如,這些功能可以基於裝置證明。程序可以與第5圖描述的相同,除了被針對裝置認證的安全處理能力(SPC_DA)用於裝置認證的證書可以是用於裝置認證的私有密鑰(Kpriv_DA),以及裝置認證功能(DAF)可以向AAA伺服器發送裝置證明(DevCert)和一些由Kpriv_DA計算的其他材料。 The device acknowledgement of the H(e)NB can be bound to the certificate based client and authentication can be obtained using a similar mechanism as described above. Some possible mechanisms are described below. Figure 8 is an example diagram of the use of physical binding, which may perform device integrity verification and validation, as well as some or all of the functionality required for device authentication. For example, these functions can be based on device certification. The procedure may be the same as described in FIG. 5, except that the certificate for device authentication by the secure processing capability (SPC_DA) for device authentication may be a private key (Kpriv_DA) for device authentication, and a device authentication function (DAF) may A device certificate (DevCert) and some other materials calculated by Kpriv_DA are sent to the AAA server.

參考第8圖,密鑰存取和SPC_DA和Kpriv_DA之間的關係使用如連線(6)所示。證明存取和DAF和DevCert之間的關係使用如連線(8)所示。 Referring to Figure 8, the key access and the relationship between SPC_DA and Kpriv_DA are as shown in connection (6). Prove that the relationship between access and DAF and DevCert is as shown in connection (8).

H(e)NB和TrE可以在公共通信會話或公共安全協定(比如IKEv2協定)的連續會話中在相同的封包、消息中共同執行裝置確認程序和基於證明的用戶端認證程序的指定部分。有效地,該綁定機制的程序可以與第6圖描述的相似。再參考第6圖,與使用基於預共用秘密的裝置認證的情況相比,其不同點可以如下所述。SPC_DA可以從基於來自AAA伺服器的AUTH挑戰的AUTH挑戰以及Kpriv_DA計算敏感臨時結果,而不是基於來自AAA伺服器的AUTH挑戰和TrE所持有(以及SPC_DA所使用來計算和轉發給DAF計算結果)的預共用秘密來計算所述敏感臨時結果。AAA伺服器可以向DAF請求裝置認證證明(DevCert)。在回應中,與SPC_DA共同工作的DAF,可以向AAA伺服器計算和轉發:1)認證回應(AUTH)(使用Kpriv_DA),和/或2)DevCert。在接收到AUTH和DevCert後,AAA伺服器可以首先驗證DevCert的有效性,然後可以使用它來驗證AUTH。如果校驗了驗證結果,則其已經認證過所述裝置。 The H(e)NB and TrE may jointly execute the device validation procedure and the specified portion of the certificate-based client authentication procedure in the same packet, message in a continuous session of a public communication session or a public safety agreement (such as the IKEv2 protocol). Effectively, the procedure of the binding mechanism can be similar to that described in FIG. Referring again to Fig. 6, the difference can be as follows as compared with the case of using the pre-shared secret based device authentication. SPC_DA can calculate sensitive temporary results from AUTH challenges based on AUTH challenges from AAA servers and Kpriv_DA, rather than based on AUTH challenges and TrEs from AAA servers (and SPC_DA used to calculate and forward DAF calculations) Pre-shared secrets to calculate the sensitive temporary results. The AAA server can request a device authentication certificate (DevCert) from the DAF. In response, the DAF working with SPC_DA can be calculated and forwarded to the AAA server: 1) Authentication Response (AUTH) (using Kpriv_DA), and/or 2) DevCert. After receiving AUTH and DevCert, the AAA server can first verify the validity of DevCert and then use it to verify AUTH. If the verification result is verified, it has already authenticated the device.

儘管有不同,就具邏輯綁定來說,可以按照與基於預共用秘密的認證中的情況相似的方式來執行邏輯綁定。例如,DAF可以將AUTH和DevCert轉發到AAA伺服器,也可以在同一消息中包括Validation_Data。該Validation_Message可從TrE內部的DVF得到,以及可以由DVF通過使用TrE私有密鑰來簽名。 Although there is a difference, logical binding can be performed in a manner similar to the case in authentication based on pre-shared secrets. For example, the DAF can forward AUTH and DevCert to the AAA server, or include Validation_Data in the same message. The Validation_Message is available from the DVF inside the TrE and can be signed by the DVF by using the TrE private key.

第9圖是一個綁定機制的示例圖。在這個示例中,沒有從AAA伺服器到裝置的認證挑戰本身。反而是, 在伺服器請求裝置發送其證明DevCert(見連線(7-c))之後,該裝置可以發送其DevCert和AUTH(從Kpriv_DA計算得到)到AAA伺服器,如連線(7-d)所示。AAA伺服器可以將AUTH與DevCert進行驗證,並發送認證狀態的確認(7-e)。 Figure 9 is an example diagram of a binding mechanism. In this example, there is no authentication challenge itself from the AAA server to the device. instead, After the server requests the device to send its proof DevCert (see connection (7-c)), the device can send its DevCert and AUTH (calculated from Kpriv_DA) to the AAA server, as shown by the connection (7-d) . The AAA server can verify AUTH and DevCert and send a confirmation of the authentication status (7-e).

綁定的門控類型可以在基於證明的認證中實施。這個示例與基於預共用秘密的認證示例類似。第10圖是該綁定機制的示例圖。參考第10圖,DVF通過允許存取到TrE持有的一些功能和資料可以執行兩種類型的門控程序(取決於裝置完整性確認結果的狀態)。 The type of gating that is bound can be implemented in certificate-based authentication. This example is similar to the pre-shared secret based authentication example. Figure 10 is an example diagram of the binding mechanism. Referring to Figure 10, the DVF can perform two types of gating procedures (depending on the state of the device integrity confirmation result) by allowing access to some of the functions and materials held by the TrE.

如果裝置完整性確認結果是不成功,則DVF可以阻止DAF存取TrE中的SPC_DA,如第10圖的連線(A:門控)所示。可替換的,DVF可以阻止SPC_DA存取需要執行對AAA伺服器的成功認證的Kpriv_DA。這些類型的門控功能可以提供裝置確認和裝置認證之間的另一種類型的邏輯綁定。 If the device integrity confirmation result is unsuccessful, the DVF can prevent the DAF from accessing the SPC_DA in the TrE as shown in the connection (A: Gating) of FIG. Alternatively, the DVF can prevent the SPC_DA from accessing Kpriv_DA that requires successful authentication of the AAA server. These types of gating functions can provide another type of logical binding between device acknowledgment and device authentication.

提供了裝置完整性確認和其他本質裝置功能之間的廣義的綁定。 Provides a broad binding between device integrity validation and other essential device functions.

裝置完整性確認和裝置認證之間的綁定的概念(如上文所述)通常可以意味著裝置完整性確認的程序、輸入和/或使用的中間資料、和/或結果可以“門控”認證過程或程序。 The concept of binding between device integrity confirmation and device authentication (as described above) can generally mean that the device integrity, procedures, input and/or usage of intermediate data, and/or results can be "gated" for authentication. Process or program.

綁定的概念一般化可以根據:可以實施綁定的裝置的類型,以及可以綁定到裝置完整性確認的程序的裝 置功能。在最一般意義上,如果存在裝置D有能力去校驗、報告、和/或驗證其自身的裝置完整性(通過其自身,或通過與外部實體和/或能力執行交互作用程序以執行被認為是該裝置的本質功能的至少一個功能X),則通常認為可以實施綁定。本質的功能(非其依意圖執行)可以是,在正常、有用的意義上講,裝置X不會被認為是可操作的。裝置(比如行動電話)的本質功能的示例,可以包括以下中的一個或多個:發送危險警報的能力、用戶認證(到網路)、裝置認證、核心應用、通信堆疊執行、使用者戶認證(到裝置)、裝置管理功能、無線信號傳輸或接收、或裝置的供電和管理功能。 The generalization of the concept of binding can be based on the type of device that can be bound, and the program that can be bound to the device integrity confirmation. Set the function. In the most general sense, if there is a device D capable of verifying, reporting, and/or verifying its own device integrity (by itself, or by performing an interaction with external entities and/or capabilities to perform the process is considered Is at least one function X) of the essential function of the device, and it is generally considered that binding can be implemented. The essential function (which is not intended to be performed) may be that device X is not considered to be operational in a normal, useful sense. Examples of the essential functions of a device, such as a mobile phone, may include one or more of the following: ability to transmit a hazard alert, user authentication (to the network), device authentication, core application, communication stack execution, user authentication (to device), device management functions, wireless signal transmission or reception, or power and management functions of the device.

綁定可能被定義以及實施為一個程序,在該程序中,裝置完整性確認程序的資料D_V、程序P_V或結果R_V可以向本質功能X的成功運轉指示比如D_V、P_V和/或R_V之間唯一的並且難以或不可能偽造或克隆(clone)的關係。綁定機制的三種在前面的章節中描述的類型可以再次被應用。由於共用存在和加密手段帶來的綁定,由於使用相同或連續的通信協定封包、消息、一個或多個會話帶來的綁定,和/或由於門控或到資料D_X或程序P_X的條件存取所帶來的綁定,其對本質功能X的成功運轉來講是本質的,該功能X成功運轉是建立在對裝置D成功確認的條件上的。 The binding may be defined and implemented as a program in which the device D_V, program P_V or result R_V of the device integrity verification program may indicate to the successful operation of the essential function X such as D_V, P_V and/or R_V And it is difficult or impossible to forge or clone the relationship. The three types of binding mechanisms described in the previous sections can be applied again. Binding due to shared presence and encryption, due to the use of the same or continuous communication protocol packets, messages, bindings brought by one or more sessions, and/or due to gating or conditions to data D_X or program P_X The binding brought by the access is essential to the successful operation of the essential function X, and the successful operation of the function X is based on the condition for successful confirmation of the device D.

第11圖是第二類性的綁定(即,綁定的門控類型)可以在確認程序(DVF)和裝置上的功能(X)之間使 用的示例圖。TrE在其內可以有用於功能X的安全處理能力(SPC_X),以及功能X所需的敏感資料(SD_X)。該DVF也可以對裝置自身上的功能(X)、以及該功能所需的裝置的非TrE部分上的任何資料(D_X)、嵌入在或連接到裝置D的元件/模組上的功能(X_EC)、以及基於網路的功能(X_N)和它可使用的資料(D_X_N)進行門控。 Figure 11 is a second type of binding (ie, the type of gating of the binding) that can be made between the validation program (DVF) and the function (X) on the device. An example diagram used. The TrE can have a secure processing capability for function X (SPC_X) and sensitive data (SD_X) required for function X. The DVF can also function on the device itself (X), and any data on the non-TrE portion of the device required for the function (D_X), functions embedded in or connected to the components/modules of the device D (X_EC) ), as well as the network-based function (X_N) and the data it can use (D_X_N) for gating.

第11圖顯示了多種類型的門控(A至G),其中根據裝置的完整性確認的結果,DVF可以門控到下列各項的存取:A)安全處理能力SPC_X,和/或B)功能SPC_X可能需要的在TrE中的敏感資料SD_X,和/或C)可能在TrE內部或外部的裝置上的任何功能X,和/或D)可能在TrE內部或外部的且功能X需要的裝置上的任何資料,和/或E)在裝置的嵌入式元件(例如,SoC)上或在連接到裝置的不連續模組(例如,UICC)上的任何功能X_EC,和/或F)由外部實體(例如,來自網路)執行的任何功能X_N,和/或G)任何這樣的外部功能X_N所需要的任何資料D_X_N。 Figure 11 shows the various types of gating (A to G), where DVF can gate access to the following items based on the integrity of the device: A) Safe Processing Capabilities SPC_X, and/or B) Functional SPC_X may require sensitive data SD_X in the TrE, and/or C) any function X, and/or D) that may be internal or external to the TrE, and may be required for internal or external TrE and function X Any information on, and/or E) any function X_EC, and/or F) on the embedded component of the device (eg, SoC) or on a discontinuous module (eg, UICC) connected to the device by external Any function X_N executed by the entity (eg, from the network), and/or G) any material D_X_N required by any such external function X_N.

需要注意的是,程序X的例子可以將下列功能包括為通信功能:例如,無線電和基帶傳輸和接收、裝置功率管理(包括開/關)、使用者介面、媒體處理器功能、GPS以及其他定位功能、計時器和定時同步功能,以及通信功能(比如WLAN)、藍芽、胞元通訊、諸如網路功能之類的高層應用、單一登錄和識別聯合和管理功能、諸如編解碼功能之類的語音和其他媒體功能、遊戲功能、以及用於它們的安全程序(比如用戶認證、裝置認證、申請授權、 包括加密/解密以及簽名和簽名驗證的加密操作)、以及裝置的任何其他功能。 It should be noted that the program X example can include the following functions as communication functions: for example, radio and baseband transmission and reception, device power management (including on/off), user interface, media processor function, GPS, and other positioning. Features, timers and timing synchronization, as well as communication functions (such as WLAN), Bluetooth, cell communication, high-level applications such as networking functions, single sign-on and recognition federation and management functions, such as codec functions Voice and other media features, game features, and security programs for them (such as user authentication, device authentication, application authorization, Includes encryption/decryption and cryptographic operations for signature and signature verification), as well as any other functionality of the device.

SPC_X可以包括但不侷限於加密加(解)密、簽名生成或驗證、亂數生成或使用、定時同步和時間戳、消息認證碼生成和驗證、加密密鑰的生成、導出、或管理(包括反對(deprecation)或隔離)、證明驗證以及TrE認證需要的秘密材料的計算、裝置的使用者、裝置本身、或訂戶和/或裝置的擁有者或授權。 SPC_X may include, but is not limited to, encryption plus (decryption), signature generation or verification, random number generation or use, timing synchronization and time stamping, message authentication code generation and verification, encryption key generation, derivation, or management (including Deprecation or isolation), certification verification, and calculation of secret material required by TrE certification, the user of the device, the device itself, or the owner or authorization of the subscriber and/or device.

功能X_EC的示例可以包括但不侷限於資料儲存和處理功能、認證功能、密鑰生成和使用、加(解)密、簽名生成和驗證、配置管理等。 Examples of functions X_EC may include, but are not limited to, data storage and processing functions, authentication functions, key generation and usage, addition (decryption), signature generation and verification, configuration management, and the like.

功能X_N的示例可以包括但不侷限於資料儲存和處理功能、網路對任務提供的應用(比如裝置管理、供應、高層應用(比如網路存取等)、DRM、語音和多媒體服務和遊戲功能、裝置管理服務、通信服務、單一登錄和識別聯合和管理等)。 Examples of functions X_N may include, but are not limited to, data storage and processing functions, network-to-task-provided applications (such as device management, provisioning, high-level applications (such as network access, etc.), DRM, voice and multimedia services, and gaming functions). , device management services, communication services, single sign-on and identification federation and management, etc.).

門控程序可以級聯(cascade)執行。即,DVF可以門控一個應用的存取,其中該應用可以門控到另一個應用或資料等的存取。DVF可以門控多個程序或資料,其中的一些或全部可以具有因果或對應關係。 The gate program can be cascaded. That is, the DVF can gate access to an application, where the application can gate access to another application or data. DVF can gate multiple programs or materials, some or all of which can have causal or correspondence relationships.

雖然本發明的特徵和元素以特定的結合進行了描述,但每個特徵或元素可以在沒有其他特徵和元素的情況下單獨使用,或在與或不與其他特徵和元素結合的各種情況下使用。此處提供的方法或流程圖可以在由通用電 腦或處理器執行的電腦程式、軟體或韌體中實施,其中所述電腦程式、軟體或韌體包含在電腦可讀儲存媒體中。電腦可讀儲存媒體的實例包括唯讀記憶體(ROM)、隨機存取記憶體(RAM)、暫存器、快取記憶體、半導體記憶裝置、諸如內部硬碟和可移動磁片之類的磁性媒體、磁光媒體和如CD-ROM光碟和數位多功能光碟(DVD)之類的光媒體。 Although the features and elements of the present invention are described in a particular combination, each feature or element can be used alone or in combination with other features and elements. . The method or flow chart provided here can be used by general purpose electricity Implemented in a computer program, software or firmware executed by a brain or processor, wherein the computer program, software or firmware is contained in a computer readable storage medium. Examples of computer readable storage media include read only memory (ROM), random access memory (RAM), scratchpad, cache memory, semiconductor memory devices, such as internal hard disks and removable magnetic disks. Magnetic media, magneto-optical media, and optical media such as CD-ROM discs and digital versatile discs (DVDs).

舉例來說,恰當的處理器包括:通用處理器、專用處理器、常規處理器、數位信號處理器(DSP)、多個微處理器、與DSP核心相關的一個或多個微處理器、控制器、微控制器、專用積體電路(ASIC)、現場可編程閘陣列(FPGA)電路、任何其他類型的積體電路(IC)和/或狀態機。 For example, suitable processors include: general purpose processors, special purpose processors, conventional processors, digital signal processors (DSPs), multiple microprocessors, one or more microprocessors associated with the DSP core, control , microcontroller, dedicated integrated circuit (ASIC), field programmable gate array (FPGA) circuit, any other type of integrated circuit (IC) and/or state machine.

與軟體相關聯的處理器可以用於實現一個射頻收發器,以便使用在無線發射接收單元(WTRU)、使用者設備(UE)、終端、基地台、無線電網路控制器(RNC)或者任何主機電腦中。WTRU可以與採用硬體和/或軟體形式實施的模組結合使用,例如照相機、攝像機模組、可視電話、揚聲器電話、振動裝置、揚聲器、麥克風、電視收發器、免持耳機、鍵盤、藍芽®模組、調頻(FM)無線單元、液晶顯示器(LCD)顯示單元、有機發光二極體(OLED)顯示單元、數位音樂播放器、媒體播放器、視頻遊戲機模組、網際網路瀏覽器和/或任何無線區域網路(WLAN)或超寬頻(UWB)模組。 A processor associated with the software can be used to implement a radio frequency transceiver for use in a wireless transmit receive unit (WTRU), user equipment (UE), terminal, base station, radio network controller (RNC), or any host In the computer. The WTRU may be used in conjunction with modules implemented in hardware and/or software, such as cameras, camera modules, video phones, speaker phones, vibration devices, speakers, microphones, television transceivers, hands-free headsets, keyboards, Bluetooth ® Module, FM Wireless Unit, Liquid Crystal Display (LCD) Display Unit, Organic Light Emitting Diode (OLED) Display Unit, Digital Music Player, Media Player, Video Game Console Module, Internet Browser And/or any wireless local area network (WLAN) or ultra wideband (UWB) module.

公開了一種系統、方法和工具 (instrumentality)來執行網路裝置的完整性確認(validation)。網路裝置可以包括安全記憶體。例如,安全記憶體可以包含在安全硬體模組中。安全記憶體可以接收根密鑰。例如,根密鑰可以在製造或供應時被安全記憶體接收。根密鑰可以保存在安全記憶體上,並且其對於安全硬體模組之外軟體和硬體是不可見的。 A system, method and tool are disclosed (instrumentality) to perform integrity verification of the network device. The network device can include secure memory. For example, secure memory can be included in a secure hardware module. The secure memory can receive the root key. For example, the root key can be received by secure memory at the time of manufacture or provisioning. The root key can be stored on secure memory and is invisible to software and hardware outside of the secure hardware module.

所述安全硬體模組可以接收第一代碼測量(對第一代碼的測量)。例如,處理器(比如與包括安全硬體模組的網路裝置相關聯的處理器)可以選擇代碼的第一部分來測量。代碼的第一部分可以被保存在與網路裝置相關聯的記憶體上,例如ROM記憶體、RAM記憶體等等。所述處理器可以測量選擇的代碼的第一部分,這導致第一代碼測量。所述處理器可以提供該測量給安全硬體模組。 The secure hardware module can receive the first code measurement (measurement of the first code). For example, a processor (such as a processor associated with a network device including a secure hardware module) can select the first portion of the code to measure. The first portion of the code can be stored on a memory associated with the network device, such as ROM memory, RAM memory, and the like. The processor can measure the first portion of the selected code, which results in the first code measurement. The processor can provide the measurement to the secure hardware module.

所述安全硬體模組可以基於根密鑰和第一代碼測量生成第一密鑰。例如,該安全硬體模組可以得到或釋放第一密鑰。當第一代碼測量有效時,生成的第一密鑰有效,且當第一代碼測量無效時,生成的第一密鑰無效。例如,該安全硬體模組可以部分基於第一代碼測量得到第一密鑰。如果第一代碼測量無效,則得到的第一密鑰也無效。所生成的第一密鑰由該安全硬體模組生成以便提供到資源的存取。當代碼儲存在所述安全記憶體上時,可以在沒有代碼測量的情況下提供到資源的存取。 The secure hardware module can generate the first key based on the root key and the first code measurement. For example, the secure hardware module can obtain or release the first key. When the first code measurement is valid, the generated first key is valid, and when the first code measurement is invalid, the generated first key is invalid. For example, the secure hardware module can obtain the first key based on the first code measurement. If the first code measurement is invalid, the resulting first key is also invalid. The generated first key is generated by the secure hardware module to provide access to the resource. When the code is stored on the secure memory, access to the resource can be provided without code measurement.

所述第一密鑰可以與和第一功能相關聯的信任(trust)的第一階段相關(例如,一個或多個資源可以 與第一功能相關聯)。進一步地,第一利益相關方(stakeholder)可以使用該有效的第一密鑰來存取該第一功能。如果該第一密鑰無效,則所述第一利益相關方不可以存取該第一功能。這就是說,當第一代碼測量無效時,所述安全硬體模組可以阻止對第一功能的存取。 The first key may be associated with a first phase of a trust associated with the first function (eg, one or more resources may Associated with the first function). Further, the first stakeholder can use the valid first key to access the first function. If the first key is invalid, the first stakeholder may not access the first function. That is to say, when the first code measurement is invalid, the secure hardware module can block access to the first function.

所述安全硬體模組可以接收第二代碼測量(對第二代碼的測量)。該安全硬體模組可以基於第一密鑰和第二代碼測量生成第二密鑰。該第二密鑰可以與和第二功能相關聯的信任的第二階段相關(例如,一個或多個資源可以與第二功能相關聯)。進一步地,第二利益相關方可以使用有效的第二密鑰來存取第二功能。密鑰釋放可以被限制在最後已知的好的啟動階段(例如,最後已知的具有成功認證的啟動階段)。 The secure hardware module can receive a second code measurement (measurement of the second code). The secure hardware module can generate a second key based on the first key and the second code measurement. The second key may be associated with a second phase of trust associated with the second function (eg, one or more resources may be associated with the second function). Further, the second stakeholder can use the valid second key to access the second function. The key release can be limited to the last known good start-up phase (for example, the last known start-up phase with successful authentication).

資源(比如密鑰和基於硬體、代碼、和/或資料的完整性測量的功能)的生成和/或釋放可以階段地提供認證。例如,裝置可以包括若干層,每個層有其自己的認證秘密。每個認證秘密可以對應在裝置能力(比如製造商韌體、可信的執行代碼、作業系統和第三方應用)的層中的特殊的利益相關方。進一步例如,有效的第一密鑰可以與對第一啟動階段的有效認證相關聯。該有效第一密鑰可以被裝置製造商(例如,第一利益相關方)使用來存取網路裝置上的韌體,以在該韌體上執行修復。有效的第二密鑰可以與在隨後的啟動階段(例如,中間的啟動階段)期間的一個或多個軟體元件的有效認證相關聯。該有效的第二 密鑰可以被裝置管理者(例如,第二利益相關方)使用來存取所述軟體元件,例如來執行該軟體的修復。通過對已成功認證的各階段提供有效密鑰,存取可以被許可,其與最後一個沒有認證失敗的階段相當。 The generation and/or release of resources, such as keys and functions based on hardware, code, and/or data integrity measurements, may provide authentication in stages. For example, a device may include several layers, each layer having its own authentication secret. Each authentication secret may correspond to a particular stakeholder in the layer of device capabilities such as manufacturer firmware, trusted execution code, operating system, and third party applications. Further for example, the valid first key can be associated with valid authentication for the first startup phase. The valid first key can be used by a device manufacturer (eg, a first stakeholder) to access firmware on the network device to perform repairs on the firmware. The valid second key may be associated with valid authentication of one or more software components during a subsequent startup phase (eg, an intermediate startup phase). The effective second The key may be used by a device manager (eg, a second stakeholder) to access the software component, for example to perform repair of the software. By providing a valid key for each stage of successful authentication, access can be granted, which is comparable to the last stage where no authentication failed.

本申請公開的多階段認證的階段數目可以變化並且不受限制。進一步地,可以提供多個認證途徑。這就是說,在完整性校驗的某個階段,認證可以以不同的方式進行分支(branch)。例如,每個利益相關方可以提供與一個或多個認證階段相關的一個或多個策略。在每個階段,認證可以基於利益相關方的策略以不同的方式分支。利益相關方能夠在外部管理其策略。 The number of stages of multi-stage authentication disclosed herein may vary and is not limited. Further, multiple authentication paths can be provided. That is to say, at some stage of the integrity check, the authentication can be branched in different ways. For example, each stakeholder can provide one or more policies related to one or more certification phases. At each stage, authentication can be branched in different ways based on stakeholder policies. Stakeholders can manage their strategies externally.

第12圖示出了與裝置1200的啟動程序相關的多階段認證。裝置1200可以被配置具有分層啟動階段能力(例如,釋放與一個或多個階段認證相關聯的一個或多個有效密鑰)。當裝置1200認證到第一啟動階段時,裝置1200可以在1201向第一利益相關方(例如製造商)提供有效第一密鑰。該第一啟動階段可以是低等級的認證,並且與第一啟動階段相關聯的密鑰可以提供受限於製造商相關聯的韌體的存取。當裝置1200認證到第二啟動階段時,裝置1200可以在1202向第二利益相關方(例如裝置管理員)提供有效第二密鑰。該第二啟動階段可以是比第一啟動階段晚的啟動階段,並且所述與第二啟動階段相關聯的密鑰可以提供受限於認證軟體的存取。當裝置1200認證到最後一個啟動階段時,裝置1200可以在1203給第三利益相關方提供有 效第三密鑰,該第三利益相關方可以提供到核心網路、安全閘道等的存取。 Figure 12 shows the multi-stage authentication associated with the startup procedure of device 1200. Apparatus 1200 can be configured with hierarchical startup phase capabilities (eg, releasing one or more valid keys associated with one or more phase authentications). When device 1200 authenticates to the first startup phase, device 1200 can provide a valid first key to the first stakeholder (eg, the manufacturer) at 1201. The first initiation phase may be a low level of authentication, and the key associated with the first activation phase may provide access restricted by the manufacturer's associated firmware. When device 1200 authenticates to the second startup phase, device 1200 can provide a valid second key to the second stakeholder (eg, device administrator) at 1202. The second startup phase may be a startup phase that is later than the first startup phase, and the key associated with the second activation phase may provide access limited by the authentication software. When the device 1200 is authenticated to the last startup phase, the device 1200 can provide the third stakeholder with The third key, the third stakeholder can provide access to the core network, security gateway, and the like.

使用啟動程序作為實例,到受限的晶片資源和啟動執行中的最後一個已知的好的啟動階段的認證秘密的存取可以被釋放。這種階段釋放可以允許對於代碼的信任的裝置軟體/韌體修復(將低層用於對裝置的可信遠端裝置管理更新程序)。這可以依賴於來自信任之安全不可改變晶片基礎的一串信任源。例如,一旦重設,可以期望特定的晶片配置來釋放第一密鑰。該配置可以確保處理器會跳到適當的內部執行代碼,這隨後可以開始聚攏代碼,以在該系列信任執行的下一階段之前進行測量。如果初始的晶片配置不正確,例如跳躍向量不是內部ROM代碼,則該初始的以及隨後的完整性測量可能與期望的不同,並且該裝置不能進行下一個有效階段。 Using the launcher as an example, access to the authentication secret to the last known good start phase of the restricted wafer resource and boot execution can be released. This phase release may allow for device software/firmware repair of the code (use the lower layer for the trusted remote device management update program for the device). This can depend on a string of trust sources from the trustworthy security unchangeable wafer base. For example, once reset, a particular wafer configuration may be desired to release the first key. This configuration ensures that the processor will jump to the appropriate internal execution code, which can then begin to gather the code to take measurements before the next stage of the series trust execution. If the initial wafer configuration is incorrect, such as the jump vector is not an internal ROM code, then the initial and subsequent integrity measurements may be different than desired, and the device cannot proceed to the next active phase.

控制的形式可以包括晶片資源的硬體錨定門控,測量的元件的完整性比較,和/或基於系統實際的測量完整性的密鑰導出。在後面的示例中,由於結果密鑰可能與常規操作之所需不同,因此可以使用公開的系統和方法於為其他用途生成多個可信控制執行路徑。因此,例如一個外部實體可以直接控制裝置的管腳,這會導致不同的啟動順序,並因此導致同樣基於信任根的不同密鑰。 Controlled forms may include hardware anchor gating of wafer resources, integrity comparison of measured components, and/or key derivation based on actual measurement integrity of the system. In the latter examples, the disclosed system and method can be used to generate multiple trusted control execution paths for other uses, as the resulting key may be different than required for normal operation. Thus, for example, an external entity can directly control the pins of the device, which can result in different startup sequences and thus result in different keys that are also based on the root of trust.

例如,除了傳統的參數外,通過每一個啟動等級上強加兩個額外的認證因數,可以提供認證。到外部實體的認證可以需要獲知:1)啟動階段特定的加密簽名秘密 或者加密的密鑰,其被公開,如果2)啟動階段特定的代碼是正確的(通過完整性校驗)。 For example, in addition to the traditional parameters, authentication can be provided by imposing two additional authentication factors on each of the activation levels. Authentication to external entities may need to be known: 1) Start-up phase-specific cryptographic signature secrets Or an encrypted key that is exposed if 2) the startup phase specific code is correct (by integrity check).

所得到的應用可以是:外部實體可以根據實體需要的功能性遠端確認裝置的完整性。此外,獨立的利益相關方(例如,裝置或者裝置製造商的硬體或者不同的韌體以及軟體層)可以被確保:其他實體可能不能修改該獨立的利益相關方的對應韌體或者軟體,而不必禁止該裝置功能。 The resulting application may be that the external entity can confirm the integrity of the device based on the functionality required by the entity. In addition, independent stakeholders (eg, hardware or different firmware and software layers of the device or device manufacturer) can be assured that other entities may not be able to modify the corresponding firmware or software of the independent stakeholder, and It is not necessary to disable the device function.

通過檢測和使用可信硬體機制而強制加密密鑰來解鎖晶片資源以及針對啟動程序中下一階段的提供的秘密(例如加密密鑰、簽名密鑰和完整性測量),示例階段啟動序列開始。隨著每一階段被成功校驗,晶片資源和新的秘密以及測量就變得可用。 The sample phase start sequence begins by forcing the encryption key to detect and use the trusted hardware mechanism to unlock the wafer resources and for the secrets provided for the next stage in the launcher (eg, encryption key, signature key, and integrity measurement) . As each stage is successfully verified, wafer resources and new secrets and measurements become available.

在一些情況中,資訊可能會在核心可信域內,並且可以是對硬體可用的但不可被軟體/韌體所查看或佔有,晶片資源和其他資訊可以釋放到執行環境中,因為基於代碼的每一個階段都被校驗和檢驗為是值得信任的(例如基於代碼校驗、資料校驗、硬體校驗等而被驗證是值得信任的)。 In some cases, the information may be in the core trusted domain and may be available to the hardware but not viewable or possessed by the software/firmware. Wafer resources and other information may be released into the execution environment because of the code-based Each phase is checked and verified to be trustworthy (eg, verified based on code verification, data verification, hardware verification, etc.).

每一個啟動階段需要在安全啟動程序中對應其位置的特權和控制。為某一階段排他性的生成證書可以允許控制擴展超出平臺的內部,例如為了到外部實體的認證。 Each startup phase requires privileges and controls corresponding to its location in the secure boot process. Exclusively generating a certificate for a certain stage may allow the control extension to extend beyond the platform, for example to authenticate to an external entity.

例如,在裝置管理和裝置認證的情況下,製造 商會需要特權來更新韌體而網路營運商會需要修復或者更新軟體和/或配置資料,但不是對韌體進行修復或更新。如果裝置通過了韌體的完整性校驗但沒有通過軟體的校驗,則可用的密鑰可以是允許網路營運商來為了更新軟體而進行認證裝置用的。然而,如果裝置韌體校驗也失敗,則用來將裝置認證到管理系統的密鑰可以被釋放,但不是認證到網路需要的密鑰,意思是原始程序可能是要就地遠端並且安全的修復/安裝韌體,以使該裝置不再以不安全的方式(即信任根程序以外的方式)啟動。該韌體失敗會觸發釋放備選功能來幫助修復(例如,由於失敗,認證會採用不同的分支)。提供信任證實根的優點是可以允許對裝置的韌體信任代碼基礎進行遠端管理。 For example, in the case of device management and device certification, manufacturing The Chamber of Commerce needs the privilege to update the firmware and the network operator will need to repair or update the software and/or configuration information, but it will not fix or update the firmware. If the device passes the integrity check of the firmware but does not pass the verification of the software, the available key may be used by the network operator to authenticate the device in order to update the software. However, if the device firmware verification also fails, the key used to authenticate the device to the management system can be released, but not the key required to authenticate to the network, meaning that the original program might be remotely located and Securely fix/install the firmware so that the device is no longer launched in an unsafe manner (ie, in a manner other than the trusted root program). This firmware failure triggers the release of an alternate feature to help with the fix (for example, authentication will take a different branch due to failure). The advantage of providing a trust confirmation root is that it allows remote management of the device's firmware trust code base.

基於系統的信任程度,不同的利益相關方(例如營運商和應用提供商)可以允許使用不同的密鑰,以啟動次序中的測量的結果作為特徵。這可能意味著一些營運商或者裝置擁有者可能在多個階段中依然允許系統啟動到部分可信但部分不可信的狀態。即使在這樣的狀態中,裝置會被要求生成和使用特定加密密鑰(例如,為了指示外部使用者關於裝置的狀態,或者為在這種裝置部分可信的狀態下依然被允許的應用提供安全性)。一個選項可以是生成和使用高強度的密鑰(其中啟動序列中可以建立高水準的信任的例子中),並且限於使用相對較低強度的密鑰(如果基於該啟動序列結果而建立起信任的相對較低等級)。應該預先提供策略,並且信任根可以使用適當的密鑰強度, 該密鑰強度對應於可建立的信任等級。當甚至部分最佳化的經過信任驗證的系統需要使用加密資源來發送特定資訊給外部而不需要額外的密鑰強度等級(這可能與啟動系統的信任度不一致)時,對特定於不同等級的信任的多個密鑰的生成和使用是有用的。 Based on the degree of trust of the system, different stakeholders (eg, operators and application providers) may allow different keys to be used to characterize the results of the measurements in the initiation sequence. This may mean that some operators or device owners may still allow the system to boot to a partially trusted but partially untrusted state in multiple phases. Even in such a state, the device may be required to generate and use a particular encryption key (eg, to indicate an external user's status regarding the device, or to provide security for applications that are still allowed in a partially trusted state of the device) Sex). An option may be to generate and use a high-intensity key (in the example where a high level of trust can be established in the boot sequence) and to use a relatively low-intensity key (if trust is established based on the result of the boot sequence) Relatively low level). The policy should be provided in advance, and the root of trust can use the appropriate key strength, This key strength corresponds to an trust level that can be established. When even partially optimized trust-validated systems need to use cryptographic resources to send specific information to the outside without the need for an additional key strength level (which may be inconsistent with the trust of the booting system), for different levels of The generation and use of multiple keys that are trusted is useful.

不同密鑰的生成可以基於不同啟動序列和不同代碼,以使得可以有不止一組有效階段。從不同的啟動序列得到的可能的裝置唯一秘密密鑰可能從相同的信任根(使用相同的根密鑰)得到,而且因此值得信任但明顯不同並且互相排斥,這允許區分角色(例如,可信測試模式對於可信常規操作)。 The generation of different keys can be based on different startup sequences and different codes so that there can be more than one set of valid phases. Possible device unique secret keys derived from different boot sequences may be derived from the same root of trust (using the same root key) and are therefore trustworthy but distinctly different and mutually exclusive, which allows for distinguishing roles (eg, trusted Test mode for trusted normal operations).

可以提供用於密鑰導出的演算法選擇和簽名機制。可以為下一階段密鑰導出和/或當前階段簽名或者認證執行特定的演算法。這些控制可以存在於加密證書封裝中的專用控制暫存器欄位,以使一旦解密,該欄位值可以被插入到啟動階段認證模組的相應暫存器中,這可以設置執行控制。所述啟動階段認證模組可以是TrE。 An algorithm selection and signature mechanism for key derivation can be provided. A particular algorithm can be executed for the next stage key derivation and/or current stage signature or authentication. These controls may exist in a dedicated control register field in the encryption certificate package so that once decrypted, the field value can be inserted into the corresponding register of the boot phase authentication module, which can set the execution control. The startup phase authentication module may be a TrE.

第13A圖、第13B圖和第13C圖示出了可以實施公開的系統、方法以及可能使用的手段的實施方式的晶片。 Figures 13A, 13B, and 13C illustrate wafers that can implement embodiments of the disclosed systems, methods, and possibly means.

可以使用安全的多階段啟動認證,例如,在安全的硬體模組(例如啟動階段認證模組1300)中。啟動階段認證模組1300可能包含四個元件:根裝置單一秘密密鑰(根密鑰),控制信號和階段特定密鑰導出功能(KDF),密碼引擎,以及簽名機制。到模組的介面可以包括配置和 資料匯流排介面。配置暫存器可以執行指令和資料流,例如MMU的控制或啟動執行向量,晶片I/O等。通過位於啟動階段認證模組1300的內部,該密鑰路徑可以被保護為不被軟體/韌體查看。該啟動階段配置介面可以確保晶片具有發起安全的啟動程序的合適配置。 Secure multi-stage boot authentication can be used, for example, in a secure hardware module (eg, startup phase authentication module 1300). The startup phase authentication module 1300 may include four components: a root device single secret key (root key), a control signal and a phase specific key derivation function (KDF), a cryptographic engine, and a signature mechanism. The interface to the module can include configuration and Data bus interface. The configuration register can execute instructions and data streams, such as MMU control or boot execution vectors, wafer I/O, and the like. By being located inside the boot phase authentication module 1300, the key path can be protected from being viewed by the software/firmware. This startup phase configuration interface ensures that the wafer has the proper configuration to initiate a secure boot process.

如果安全啟動程序沒有正確開始,例如,如果配置是針對備選啟動序列的,則對晶片資源的結果階段的存取和裝置唯一的秘密密鑰可能不存在,這會進而阻止進入到下一啟動階段和對特定階段的簽名密鑰的解密,且因此,外部實體可能不能對裝置的信任狀態進行證實。 If the secure boot procedure does not start correctly, for example, if the configuration is for an alternate boot sequence, the access to the resulting phase of the wafer resource and the device's unique secret key may not exist, which in turn prevents entry into the next boot phase. And the decryption of the signature key for a particular phase, and therefore, the external entity may not be able to verify the trust status of the device.

以下一個或者多個可以組合:帶密鑰的加密哈希(hashing)演算法,裝置唯一秘密密鑰,回饋密鑰路徑,以及簽名機制。認證秘密的層可以加密地被綁定於特定裝置以及測量資訊(例如執行代碼以及啟動配置控制)的完整性。如果測量資訊缺少完整性,則執行的後續的相依賴的層可能不能存取或解密該認證秘密。例如,如果裝置沒有適當的設定其處理器跳躍向量,沒有從內部啟動或者未處於除錯模式,則會檢測到不同的位元圖樣,這可以生成不正確的密鑰,它隨後不會對外部興趣方進行認證。 One or more of the following may be combined: a cryptographic hashing algorithm with a key, a device unique secret key, a feedback key path, and a signature mechanism. The layer of authentication secrets can be cryptographically bound to specific devices and the integrity of the measurement information (eg, execution code and launch configuration control). If the measurement information lacks integrity, the subsequent dependent layer of execution may not be able to access or decrypt the authentication secret. For example, if the device does not properly set its processor hopping vector, does not start internally or is not in debug mode, it will detect a different bit pattern, which can generate an incorrect key, which will then not be external Interested parties are certified.

裝置可以包含唯一的秘密密鑰。裝置的唯一秘密密鑰可以從先前的啟動階段密鑰以及從測量的代碼中導出。由於裝置唯一密鑰可能在裝置上不存在,但可以通過代碼本身導出,如果代碼被修改,則裝置唯一秘密密鑰可能不正確。根裝置唯一秘密密鑰(根密鑰)可以在初始供 應時或者製造時秘密嵌於裝置內部,並且對裝置唯一。該根裝置唯一秘密密鑰可能不可用,除非使用特定的裝置啟動配置。該根密鑰可能對軟體/韌體不可見,且可以為後續啟動階段的裝置唯一密鑰提供種子,它也對軟體/韌體不可見,但可以用於認證或者簽名機制,其可以驗證密鑰的存在以及從而向啟動次序中的該階段驗證裝置的完整性。 The device can contain a unique secret key. The unique secret key of the device can be derived from the previous boot phase key and from the measured code. Since the device unique key may not exist on the device, it may be derived by the code itself, and if the code is modified, the device unique secret key may be incorrect. The root device unique secret key (root key) can be initially provided It is secretly embedded inside the device at the time of manufacture or at the time of manufacture and is unique to the device. The root device unique secret key may not be available unless the configuration is initiated using a particular device. The root key may not be visible to the software/firmware and may be seeded for device unique keys in subsequent startup phases. It is also invisible to the software/firmware, but can be used for authentication or signature mechanisms, which can verify the secret. The presence of the key and thus the integrity of the device is verified to this stage in the startup sequence.

根裝置唯一秘密密鑰可以是有適當的強度(例如現在大約是256位元)的密鑰,其可在製造程序中例如配置為一次性可編程熔絲或者在記憶體中,以使得它對軟體/韌體,竊聽晶片信號,探測,簡單和差分功率分析等等是秘密和隱藏的。它可對裝置唯一,任何人都不知道,並且一旦重設則在初始種下密鑰導出功能 The root device unique secret key may be a key of appropriate strength (eg, now approximately 256 bits), which may be configured, for example, as a one-time programmable fuse or in memory in a manufacturing process such that it is Software/firmware, eavesdropping on chip signals, probing, simple and differential power analysis, etc. are secret and hidden. It can be unique to the device, nobody knows it, and once reset, the key export function is initially

第14圖示出了密鑰導出功能的實例。 Figure 14 shows an example of a key derivation function.

密鑰導出功能可以服務兩個功能。它可以生成後續階段的密鑰,以及其能測量後續啟動代碼。它可以是帶密鑰的加密哈希函數,例如HMAC-SHA-256,由於它的單向的特性,它可以確保獲取後續階段密鑰不會洩露早先的密鑰的任何資訊,以及測量資料中的任何位元錯誤會導致與正確密鑰不相關的很大不同的密鑰。加密階段特定的簽名秘密可被提供完整性資訊。完整性資訊可以提供對組件或者功能的測量的完整性校驗值的確認,以及因此釋放下一階段功能。 The key export feature can serve two functions. It can generate keys for subsequent phases, and it can measure subsequent startup code. It can be a cryptographic hash function with a key, such as HMAC-SHA-256. Due to its one-way nature, it can ensure that any information that the subsequent key does not reveal the previous key, as well as the measurement data, is obtained. Any bit error can result in a very different key that is not related to the correct key. Encryption phase specific signature secrets can be provided with integrity information. The integrity information can provide confirmation of the measured integrity check value of the component or function, and thus release the next phase of functionality.

第15圖示出了示例性的密鑰導出細節,包括簽名機制。 Figure 15 shows exemplary key derivation details, including a signature mechanism.

對於強健的裝置認證,密鑰導出功能會生成啟動階段裝置唯一秘密密鑰,對於晶片軟體/韌體以及外部實體來講,該啟動階段裝置唯一秘密密鑰不是直接可讀的。因此裝置唯一密鑰可以在認證或者簽名機制的直接路徑被發送。外部實體和軟體隨後可以提供帶有挑戰消息的認證或者簽名機制,以通過外晶片介面來確認該裝置的啟動狀態的新鮮度(freshness)。 For robust device authentication, the key derivation function generates a unique secret key for the boot phase device, which is not directly readable for the chip software/firmware and external entities. Thus the device unique key can be sent in the direct path of the authentication or signature mechanism. The external entity and software can then provide an authentication or signature mechanism with a challenge message to confirm the freshness of the device's startup state via the external chip interface.

第16圖示出了多階段密鑰導出細節的實例。 Figure 16 shows an example of multi-stage key derivation details.

隨著啟動流程從初始啟動以及程式載入器序列開始進展到作業系統和應用載入,代碼的每一個啟動階段的完整性可以在它執行之前被測量。代碼可以在每一個階段中被填入密鑰導出功能並且可以在每個階段都生成裝置唯一秘密密鑰。例如,初始時,根裝置唯一秘密密鑰(根密鑰)以及第一代碼測量可以填入到密鑰導出功能,以及可以生成第一密鑰(初始階段密鑰)。可以針對多個階段重複這個程序直到確定最後一個好的證書。 As the startup process progresses from the initial startup and the program loader sequence to the operating system and application loading, the integrity of each startup phase of the code can be measured before it is executed. The code can be populated with a key derivation function in each phase and a device unique secret key can be generated at each stage. For example, initially, the root device unique secret key (root key) and the first code measurement can be populated into the key derivation function, and the first key (initial stage key) can be generated. This procedure can be repeated for multiple phases until the last good certificate is determined.

第17圖示出了啟動序列的實例。第16圖的實例示出了在多個階段中密鑰是如何導出的以及如何確定最後一個好的證書。初始階段密鑰可以驗證硬體可以配置用於信任執行根,例如驗證處理器導引內部ROM,硬體完整性測試結果正確,以及安全敏感I/O管腳被正確設置,例如不在測試模式。 Figure 17 shows an example of a startup sequence. The example of Figure 16 shows how the key was derived in multiple phases and how to determine the last good certificate. The initial phase key verifies that the hardware can be configured to trust the execution root, such as verifying that the processor boots the internal ROM, that the hardware integrity test results are correct, and that the security-sensitive I/O pins are properly set, such as not in test mode.

如果啟動階段是根據正確的啟動配置和代碼來執行的,則最後的結果可能是加密或者簽名的密鑰,其 可以被網路實體在外部使用,以驗證裝置是以可信方式啟動的。否則,如果階段啟動代碼失敗,則最終的簽名密鑰不正確而導致外部/遠端認證失敗。 If the startup phase is performed according to the correct startup configuration and code, the final result may be an encrypted or signed key, Can be used externally by a network entity to verify that the device is booted in a trusted manner. Otherwise, if the phase startup code fails, the final signature key is incorrect and the external/remote authentication fails.

執行鏈不需要追蹤簽名密鑰鏈。啟動序列可能通過對檢驗序列的執行控制(例如,基於硬體的),這可以載入用於裝置可信操作的代碼測量。如果測量正確,則結果可以是最終密鑰,它可用於從外部確認裝置的可信操作。 The execution chain does not need to track the signature keychain. The boot sequence may be controlled by execution of the test sequence (eg, hardware based), which may load code measurements for device trusted operations. If the measurement is correct, the result can be the final key, which can be used to externally confirm the trusted operation of the device.

從有效啟動階段導出的密鑰以及控制可以解鎖在即時運行中持續的殘留密碼或者簽名密鑰。裝置管理伺服器可以使用該殘留簽名密鑰來驗證裝置已安全地啟動到值得信任狀態,以確定該伺服器可以安全下載應用代碼。另一方面,在每一啟動階段去除對密鑰的存取可以幫助保持對晶片的硬體保護域的特權控制,其應該是對特定啟動階段代碼的特定提供方是可存取的,例如,為了認證裝置個性化、供應、除錯、測試等的目的。 Keys and controls derived from the active startup phase can unlock residual passwords or signature keys that are persisted in an instant run. The device management server can use the residual signature key to verify that the device has been securely booted to a trusted state to determine that the server can securely download the application code. On the other hand, removing access to the key at each startup stage can help maintain privileged control of the chip's hardware protection domain, which should be accessible to a particular provider of the particular boot phase code, for example, In order to authenticate the purpose of device personalization, provisioning, debugging, testing, etc.

執行的啟動代碼需要檢測下一階段測量是否發生完整性失敗。例如,為下一啟動階段嵌於加密秘密封包內的可以是針對完整性失敗的指示,例如位於加密秘密封包的特定欄位內的已知的“完整性指示消息”。下一啟動階段測量的錯誤會導致在封包的欄位中出現混亂(garbled)完整性指示消息,它與期望值不匹配(其向執行啟動代碼指示完整性失敗已經發生)。 The startup code executed needs to detect if the next stage measurement has failed integrity. For example, embedded in the cryptographic seal for the next start-up phase may be an indication of an integrity failure, such as a known "integrity indication message" located within a particular field of the cryptographic seal package. An error measured during the next startup phase can result in a garbled integrity indication message in the field of the packet that does not match the expected value (which indicates to the execution startup code that an integrity failure has occurred).

啟動階段認證模組中的硬體比較器(參見例如第13A-C圖)會檢測(HW保護,對軟體或者韌體不可見的) 期望的完整性值和得到的完整性值之間的匹配,以生成硬體控制信號,來控制到例如依賴於完整性的硬體配置、晶片秘密、熔絲、I/O以及測試管腳、LED等的存取。 The hardware comparator in the startup phase authentication module (see eg Figure 13A-C) will detect (HW protection, invisible to software or firmware) Matching between the desired integrity value and the resulting integrity value to generate a hardware control signal to control, for example, integrity-dependent hardware configuration, wafer secrets, fuses, I/O, and test pins, Access to LEDs, etc.

所述控制啟動序列然後會選擇在晶片外發佈一個警報,向外部世界指示已發生錯誤。或者,該控制啟動代碼可以保持空閒,等待來自晶片介面(網路或者管腳)的輸入,以嘗試認證到外部實體。 The control initiation sequence then chooses to issue an alert outside the wafer indicating to the outside world that an error has occurred. Alternatively, the control boot code can remain idle, waiting for input from the chip interface (network or pin) to attempt authentication to the external entity.

在一個操作中,啟動階段認證模組會解密加密階段簽名秘密(封包)。然而,可能需要方法來加密和安裝該階段簽名秘密。該模組可能有“供應模式”輸入信號,“授權存取不允許”輸入信號,以及“授權階段”輸入信號,該“授權階段”輸入信號可以是1)對於只在製造階段的供應方法由一次性可編程熔絲方法進行鎖定,和/或2)在晶片上通過授權硬體變得可存取。 In one operation, the startup phase authentication module decrypts the encryption phase signature secret (packet). However, methods may be needed to encrypt and install the signature secrets at this stage. The module may have a "supply mode" input signal, an "authorized access not allowed" input signal, and an "authorization phase" input signal, which may be 1) for the supply method only during the manufacturing phase The one-time programmable fuse method is locked, and/or 2) becomes accessible on the wafer by an authorized hardware.

如果他們沒有在製造程序中通過熔絲鎖定,則晶片需要提供另一種機制來保護輸入。如果他們沒有通過熔絲鎖定,啟動階段認證模組會允許供應模式(如果裝置已經通過它自己的本文中所描述的檢測機制安全啟動的話)。這會阻止非安全啟動代碼進入供應模式。然而,可以由安全啟動代碼、硬體配置、以及晶片上的其他“授權”硬體來針對供應模式輸入的未授權存取進行保護。也就是說,啟動階段認證模組可以確保安全啟動代碼被執行,以保護用來管理保護到供應模式的存取的授權硬體的啟動代碼授權序列。在一個實施方式中,安全啟動程序可以利用 約束的密鑰(例如公共的、私有的等)以及挑戰回應協定來認證和授權申請者存取到供應程序以及供應模式輸入。 If they are not locked by a fuse in the manufacturing process, the chip needs to provide another mechanism to protect the input. If they are not locked by a fuse, the startup phase authentication module will allow the provisioning mode (if the device has been safely booted by its own detection mechanism described in this article). This will prevent the non-secure boot code from entering the provisioning mode. However, unauthorized access to the provisioning mode input can be protected by a secure boot code, a hardware configuration, and other "authorized" hardware on the wafer. That is, the boot phase authentication module can ensure that the secure boot code is executed to protect the boot code authorization sequence used to manage the authorized hardware that protects access to the provisioning mode. In one embodiment, the secure boot process can utilize Constrained keys (eg, public, private, etc.) and challenge response protocols to authenticate and authorize applicants to access the provider and supply mode inputs.

供應模式輸入允許簽名秘密封包的後續階段被加密並儲存到對軟體不可用以及對供應商不可見的受保護的暫存器中的啟動階段認證模組內部。然後,供應模式狀態會切換到加密模式。新的啟動階段代碼會被載入到密鑰導出功能。代碼載入之後,新的裝置唯一秘密密鑰會自動生成(但對使用者或者軟體不可見)。然後,與新的啟動代碼對應的新的簽名秘密被插入到密碼引擎並用新的裝置唯一秘密密鑰來加密。這結果被儲存到一個位置以取代以前的版本。 The provisioning mode input allows subsequent stages of the signature secret seal to be encrypted and stored inside the boot phase authentication module in the protected scratchpad that is not available to the software and is not visible to the vendor. The provisioning mode status then switches to encryption mode. The new startup phase code will be loaded into the key export function. After the code is loaded, the new device unique secret key is automatically generated (but not visible to the user or software). The new signature secret corresponding to the new boot code is then inserted into the cryptographic engine and encrypted with the new device unique secret key. This result is stored in a location to replace the previous version.

隨後的啟動階段代碼可以被載入,這導出新的隨後的裝置唯一秘密密鑰,其可被用於對內部儲存的隨後階段的簽名密鑰秘密進行加密。該程序會一直繼續直到完成。裝置會用新的啟動階段代碼及其對應的簽名密鑰進行重啟動。隨後的啟動階段代碼和密鑰可以保持相同(對階段裝置唯一秘密密鑰的新鏈是未知的並受限於該新鏈)。修改階段之前的啟動階段保持未修改。 Subsequent startup phase code can be loaded, which derives a new subsequent device unique secret key that can be used to encrypt the signature key secret for subsequent stages of internal storage. The program will continue until it is completed. The device will be restarted with the new boot phase code and its corresponding signature key. The subsequent start-up phase code and key can remain the same (the new chain of unique secret keys for the stage device is unknown and limited by the new chain). The startup phase prior to the modification phase remains unmodified.

第18圖示出了生成和使用密鑰的裝置的實例啟動序列流程圖,其中所述密鑰的強度(或者其他安全強度特性,例如加密演算法本身,或者演算法模式等)可以依賴於通過在啟動序列中執行的完整性校驗程序見證的系統可信度結果。 Figure 18 is a flowchart showing an example startup sequence of a device for generating and using a key, wherein the strength of the key (or other security strength characteristics, such as the encryption algorithm itself, or algorithm mode, etc.) may depend on The system credibility result witnessed by the integrity check program executed in the startup sequence.

公開的系統和方法可用於單個利益相關方(例 如遠端用戶)實施方式,它可以給單個利益相關方提供在程度變化的功能性下安全地管理裝置的靈活性。例如,在使用裝置進行安全的關鍵和複雜功能之前,遠端使用者可能需要確認裝置是否正確獲取到它的完整的裝置完整性和/或功能性。 Open systems and methods can be used for a single stakeholder As a remote user implementation, it can provide a single stakeholder with the flexibility to securely manage the device with varying degrees of functionality. For example, a remote user may need to confirm that the device correctly acquired its full device integrity and/or functionality before using the device for critical and complex functions of security.

為了確定裝置完整性和/或功能性獲得的程度,使用者會通過向裝置提交暫時的數(nonce)然後取回簽名之後的響應(例如,暫時的數會確保結果的新鮮度)來挑戰裝置。使用者會檢驗該回應以確定裝置已通過哪個階段的完整性以及健康檢驗執行。基於該結果,使用者可以確保其可以安全地與裝置交互作用(針對完整性已經被驗證的功能)。 To determine the extent to which device integrity and/or functionality is obtained, the user will challenge the device by submitting a temporary number to the device and then retrieving the response after the signature (eg, the temporary number will ensure the freshness of the result). . The user will check the response to determine the stage of integrity of the device and the health check execution. Based on this result, the user can ensure that it can safely interact with the device (for features that have been verified for integrity).

作為一個實例,如果回應表示沒有發生安全啟動程序(例如,沒有完整性校驗),則使用者會知道該裝置是被配置成非安全形式並且將不會被依賴來處理敏感資料。還有,由於一些裝置完整性受限的密鑰可能不可用,受限於安全啟動程序的加密資料也可能不可用。 As an example, if the response indicates that a secure launch procedure has not occurred (eg, there is no integrity check), then the user will know that the device is configured to be in a non-secure form and will not be relied upon to process sensitive material. Also, because some device integrity limited keys may not be available, encrypted material that is limited by the secure boot program may not be available.

如果該程序的第一階段完成了,則該裝置可能有一些安全能力,例如證實自己一些失敗功能,以及對外發送重放保護和/或簽名的災難(distress)信號的能力。遠端使用者可以從此信號確定接收到的災難信號非錯誤和/或被一些其他裝置欺騙,並且在獲知該裝置發送了災難信號的情況下採取行動來修復裝置。 If the first phase of the procedure is completed, the device may have some security capabilities, such as verifying some of its own failed features, and the ability to send replay protection and/or signed distress signals to the outside. The remote user can determine from this signal that the received disaster signal is non-erroneous and/or deceived by some other device, and take action to repair the device if it is informed that the device sent a disaster signal.

繼續該實例,如果第二階段完成,則表示更高 層次的能力/裝置完整性的新的認證密鑰集在該裝置上是可用的,其允許使用者遠端、安全地修改裝置上的失敗代碼。該情況的一種變換形式是,實現完整性的該第二階段的裝置可以獲得對密鑰的本地存取,其允許它對遠端使用者的OAM或者裝置管理(DM)伺服器(或者該伺服器應用)進行認證。在該實例的這一階段中,裝置有能力認證遠端使用者(或者他的OAM或者DM伺服器或者這種伺服器應用),因此該裝置上的一些資料和代碼可以使用與獲得的完整性階段相關的可用密鑰進行載入和簽名。也能得到與其他能力等級相關聯的其他階段。 Continue with the example, if the second phase is completed, it means higher A new set of authentication keys for hierarchical capability/device integrity is available on the device, which allows the user to remotely and securely modify the failure code on the device. A variant of this situation is that the second phase of the device implementing integrity can obtain local access to the key, which allows it to the remote user's OAM or device management (DM) server (or the servo) Application) for authentication. In this phase of the example, the device has the ability to authenticate the remote user (or his OAM or DM server or such server application) so that some of the information and code on the device can be used and obtained. Phase-related available keys are loaded and signed. Other stages associated with other competency levels can also be obtained.

最終成功的階段表示該裝置完全能夠執行遠端用戶需要完全存取和使用的功能。 The final successful phase indicates that the device is fully capable of performing functions that the remote user needs to fully access and use.

本發明不需要包括一些功能性階段並且不受限於一個或者多個利益相關方。一種形式中,裝置可以執行具有單個代表結果的單個校驗階段,這導致從遠端使用者角度來看用於自主確認的單個認證密鑰。這例如可用於確認嘗試附著到網路的裝置。公開的系統和方法也可被擴展到允許裝置的值得信任狀態的代表靈活性,以允許災難指示、裝置監視、裝置管理功能(診斷和修復)以及對裝置、服務和/或應用層次的認證程序。 The invention need not include some functional phases and is not limited to one or more stakeholders. In one form, the device can perform a single verification phase with a single representative result, which results in a single authentication key for autonomous validation from a remote user perspective. This can be used, for example, to identify devices that attempt to attach to the network. The disclosed systems and methods can also be extended to allow representative flexibility of the device's trustworthy state to allow for disaster indication, device monitoring, device management functions (diagnostics and repair), and authentication procedures for devices, services, and/or application levels. .

其他認證資訊可以受限於完整性校驗程序,(例如相較於用於裝置的到較佳網路存取所需主密鑰的用於不同目的所需之認證密鑰)。這種“其他認證”的示例可以是針對OAM的認證、應用層次服務的認證、或者在不同 於存取層的層的安全協定(例如IPsec或者TLS)的認證。其他實例包括認證裝置和/或其簡檔(例如組成員等)、用戶/使用者、服務、或者應用。例如,參考第13C圖,會向KDF發送服務預訂密鑰。結果密鑰可以是用於對服務提供商的認證的裝置唯一秘密密鑰。對裝置的挑戰可以認證用戶和裝置完整性兩者。在這種情況下,可以在合適的階段添加服務預訂密鑰。在一個實施方式中,保證了完整性的(integrity-backed)預訂密鑰在之前的階段中提供,而保證了完整性的應用密鑰在後面的階段中提供。其他資訊在KDF輸入中合併,以確保綁定到必要資訊上。通過將其他認證資訊綁定到完整性校驗程序中,可以提供不止一個獨立的認證資源。 Other authentication information may be subject to an integrity check procedure (e.g., an authentication key required for a different purpose than the master key required for better network access for the device). Examples of such "other authentications" may be authentication for OAM, authentication of application hierarchy services, or different Authentication of security protocols (such as IPsec or TLS) at the layer of the access layer. Other examples include authentication devices and/or their profiles (e.g., group members, etc.), users/users, services, or applications. For example, referring to Figure 13C, a service subscription key is sent to the KDF. The resulting key may be a device unique secret key for authentication to the service provider. A challenge to the device can authenticate both user and device integrity. In this case, the service subscription key can be added at the appropriate stage. In one embodiment, an integrity-backed subscription key is provided in a previous phase, while an application key that guarantees integrity is provided in a later phase. Additional information is combined in the KDF input to ensure binding to the necessary information. By binding other authentication information into the integrity checker, more than one independent authentication resource can be provided.

公開的系統、方法以及手段允許動態擴展信任,以允許對裝置進行安全和遠端配置。例如,出廠之後,裝置可以安全啟動到已知的未配置的狀態。這樣的裝置應首先使用包括在供應商證明中的證書。該階段中可用的認證密鑰允許外部管理實體(例如OAM或者DM伺服器)來遠端存取裝置上的配置資料結構,並允許認證的外部管理實體插入新的證書(例如,新的簽名密鑰或者營運商證明,其可能包括新的簽名密鑰等)。這些新的證書可以使用本文描述的方法進行保護。新的配置資料可以用新的密鑰進行簽名,並且可以插入新的執行階段,這也可以通過成功階段密鑰進行簽名。可以添加認證密鑰,這可以通過最終的配置校驗的成功完成來保護。例如如果裝置被重設,它可 以自動徹底重啟動至校驗新配置資料的新的階段。如果新的配置資料匹配,則結果認證密鑰可用。外部實體然後認證該裝置。如果認證通過,則外部實體可確保裝置被正確配置。 The disclosed systems, methods, and means allow for dynamic extension of trust to allow secure and remote configuration of the device. For example, after shipment, the device can be safely booted to a known, unconfigured state. Such a device should first use the certificate included in the supplier's certificate. The authentication key available in this phase allows an external management entity (such as an OAM or DM server) to remotely access the configuration data structure on the device and allow the authenticated external management entity to insert a new certificate (eg, a new signature secret) The key or the operator proves that it may include a new signature key, etc.). These new certificates can be protected using the methods described in this article. The new profile can be signed with a new key and can be inserted into a new execution phase, which can also be signed by the success phase key. An authentication key can be added, which can be protected by the successful completion of the final configuration check. For example, if the device is reset, it can Automatically restart completely to verify the new phase of the new configuration data. If the new configuration data matches, the resulting authentication key is available. The external entity then authenticates the device. If the authentication is passed, the external entity can ensure that the device is properly configured.

第19圖示出了與多階段認證相關的網路通信的實例。 Figure 19 shows an example of network communication associated with multi-stage authentication.

3GPP的中繼節點(RN)既可以對於供給(donor)eNB(DeNB)作為UE(即中繼UE),也可以對於連接到它的UE作為eNB(即中繼eNB)。由於中繼節點可以就地用於例如緊急回應或者臨時覆蓋間隙填充任務的方案,它們不能在部署時間完全配置並且沒有完全操作的所有功能性。然而由於RN是網路裝置,所以安全需求(包括裝置安全需求)可能會需要很高,這導致對完整性校驗的需要,其允許實現分階段的操作狀態。部署後配置和證書登記都需要這種分階段的操作狀態。 The 3GPP relay node (RN) may serve as a UE (ie, a relay UE) for a donor eNB (DeNB) or an eNB (ie, a relay eNB) for a UE connected thereto. Since relay nodes can be used locally, for example, for emergency response or for temporarily overwriting gap fill tasks, they cannot be fully configured at deployment time and have no full functionality for full operation. However, since the RN is a network device, security requirements (including device security requirements) may be high, which results in a need for integrity verification that allows for a phased operational state. This phased operational state is required for both post-deployment configuration and certificate enrollment.

第20圖示出了啟動和啟動後配置程序的實例,其包括使用示例性3GPP中繼節點的多階段認證和證書配置。 Figure 20 shows an example of a startup and post-boot configuration procedure that includes multi-phase authentication and certificate configuration using an exemplary 3GPP relay node.

在這個實例中,如果通過了完整性的特定階段,則使得RN能存取到已知營運商(OP)管理盒(例如OAM或者DM伺服器盒等)以及供應商的OAM/DM伺服器。然而,如果RN後續階段失敗,那麼它可能不被允許存取證書(其可能已經存在或也可能不存在於RN上),該證書是對於OP移動性管理實體(MME)的完全存取所需的。因此, RN會不通過對OP MME的完全存取認證嘗試。然而,連續發生這樣的失敗,RN可被限制為向已知的OP OAM/DM進行認證,並被指示為藉由供應商OAM/DM使用預先提供的供應商證書來被重新配置。如果獲得重新配置並藉由通過完整性校驗的進一步階段,那麼RN現在可以獲得到存取OP MME所需的證書的存取。 In this example, if a particular phase of integrity is passed, the RN is enabled to access a known carrier (OP) management box (eg, OAM or DM server box, etc.) and the vendor's OAM/DM server. However, if the RN fails in subsequent phases, it may not be allowed to access the certificate (which may or may not already exist on the RN), which is required for full access to the OP Mobility Management Entity (MME) of. therefore, The RN will not pass the full access authentication attempt to the OP MME. However, such failures occur continuously, and the RN may be restricted to authenticate to the known OP OAM/DM and indicated to be reconfigured by the vendor OAM/DM using the pre-provided vendor certificate. If reconfiguration is obtained and by passing a further phase of integrity checking, the RN can now gain access to the credentials required to access the OP MME.

公開的系統和方法會對篡改和即時失敗很敏感。在裝置完整性建立的時候或者之前可以建立分別的篡改監視程序(例如,該監視程序與信任根鏈結)。該監視器可以檢驗代碼、埠或者任何可以指示干擾或者篡改事件的東西。一旦發生這樣的事件,建立裝置的唯一秘密密鑰值被自動去除,這使認證密鑰不可用。參考第21圖,它示出了一個使用公開系統和方法的實施方式的晶片實例。使用基於完整性的認證密鑰重新建立到裝置的安全連接之嘗試可能會失敗。這會為依賴於裝置安全性的外部實體提供持續保護。 Open systems and methods are sensitive to tampering and immediate failure. A separate tampering monitoring program (eg, the monitoring program and the trusted root link) can be established at or before device integrity establishment. The monitor can verify the code, 埠 or anything that can indicate interference or tampering. Once such an event occurs, the unique secret key value of the establishing device is automatically removed, which makes the authentication key unavailable. Referring to Figure 21, there is shown an example of a wafer using an embodiment of the disclosed system and method. Attempts to re-establish a secure connection to the device using an integrity-based authentication key may fail. This provides continuous protection for external entities that rely on device security.

第22圖示出了如何將完整性校驗程序擴展到UE通信。網路可以使用完整性限制的認證密鑰向中繼節點傳遞UE密鑰。如果中繼節點由於完整性或者篡改事件而不再安全,該中繼節點將不能解密所加密的密鑰,並且來自UE的通信的安全性得以保持。 Figure 22 shows how the integrity check procedure can be extended to UE communication. The network can pass the UE key to the relay node using the integrity-qualified authentication key. If the relay node is no longer secure due to integrity or tampering events, the relay node will not be able to decrypt the encrypted key and the security of the communication from the UE is maintained.

所公開的系統和方法可以提供以下的一個或者多個:裝置簽名密鑰分階段的機制,它允許對裝置的可信性進行部分或者分階段的遠端確定;晶片資源以及認證 秘密的分階段釋放方法,其中對用於裝置的當前啟動階段的代碼的成功測量、配置資訊、以及安全啟動程序的狀態可被用於直接導出控制信號,該控制信號可以允許進一步存取晶片資源和釋放用於認證的秘密;啟用外部實體和可能部分失敗的裝置之間的可信報告、管理以及修復;消除對啟動程序中的顯式完整性校驗程序的需要,並消除儲存和保護啟動代碼參考值的需要;或者對跨公共介面(例如晶片邊界或者公開網際網路)的不同利益相關方進行存取認證。 The disclosed system and method can provide one or more of the following: a device signature key phased mechanism that allows partial or phased remote determination of device trustworthiness; wafer resources and authentication A secret phased release method in which successful measurement of code for the current startup phase of the device, configuration information, and status of the secure boot process can be used to directly derive control signals that can allow for further access to wafer resources And release secrets for authentication; enable trusted reporting, management, and repair between external entities and potentially partially failed devices; eliminate the need for explicit integrity check procedures in the launcher, and eliminate storage and protection boot The need for code reference values; or access authentication for different stakeholders across common interfaces (such as wafer boundaries or public internet).

平臺完整性策略引擎(PIPE)可以是整個平臺信任系統架構的一部分。PIPE可以控制多階段認證和密鑰釋放程序。PIPE可以控制不同的功能,包括安全啟動程序的流程、軟體和/或資料元件的完整性校驗測量的處理、根據策略的後續執行行動,和/或後續軟體載入控制的流程。該策略可以由一個或者多個外部利益相關方定義(例如製造商和/或營運商),並且在裝置上被提供,並通過遠端更新程序在欄位中更新。 The Platform Integrity Policy Engine (PIPE) can be part of the overall platform trust system architecture. PIPE can control multi-stage authentication and key release procedures. The PIPE can control different functions, including the flow of the secure boot process, the processing of the integrity check measurements of the software and/or data elements, the subsequent execution actions according to the policy, and/or the flow of subsequent software load control. The policy may be defined by one or more external stakeholders (eg, manufacturer and/or operator) and provided on the device and updated in the field via a remote update procedure.

通過繼續安裝越來越多的功能能力並在運行期間保持對元件的動態載入,PIPE可以控制受損害的軟體功能性通過受控軟體和資料校驗以及加載操作而被載入的風險。作為說明性的實例,依賴於載入操作中進展的階段,PIPE響應於認證失敗可以應用以下的一個或者多個:對平臺的電力降低;避免載入受損害的組件(component)或者隔離的組件;觸發到外部實體(比如,網路中的安全閘道 或者修復管理器)的警告,以通知低級別的失敗或者受損害的功能性;防止對平臺上的功能或者安全資訊的存取,例如認證密鑰等;或者,防止對平臺上的安全功能的存取,例如認證演算法等。 By continuing to install more and more functional capabilities and maintaining dynamic loading of components during runtime, PIPE can control the risk of compromised software functionality being loaded through controlled software and data verification and load operations. As an illustrative example, depending on the stage of progress in the load operation, the PIPE may apply one or more of the following in response to the authentication failure: power reduction to the platform; avoid loading damaged components or isolated components Trigger to an external entity (for example, a security gateway in the network) Or fix the manager's warning to notify low-level failure or compromised functionality; prevent access to features or security information on the platform, such as authentication keys, etc.; or, prevent security features on the platform Access, such as authentication algorithms.

在一些情況下失敗可能很嚴重,以至於甚至可信任的環境可能不能確保平臺中的信任,因為核心TrE功能性已經受損害了。低級別的失敗可能觸發基本操作,例如生成預設的信任根簽名的警告消息,這可能包括完整性以及重放保護以及機密性保護。也就是說,一旦發生低級別安全失敗,會通過一個或多個可用的通信頻道向網路釋放災難消息。 In some cases the failure can be so severe that even a trusted environment may not be able to secure trust in the platform because core TrE functionality has been compromised. A low level of failure may trigger basic operations, such as generating a warning message for a preset trusted root signature, which may include integrity as well as replay protection and confidentiality protection. That is, in the event of a low-level security failure, disaster messages are released to the network through one or more available communication channels.

隨著載入的功能性被建立並變得越來越複雜,裝置會執行更複雜的行動,例如作為代表網路實體的安全和可信代理,這會促進用來診斷、報告和/或替換受損害的軟體和/或配置資料的詢問程序;執行主體代碼或者資料重載/更新程序或者調查更多細節,包括用更精確的細節完整校驗懷疑被篡改的元件,以隔離元件的錯誤位置。 As the functionality of the load is built and becomes more complex, the device performs more complex actions, such as acting as a secure and trusted proxy for the network entity, which facilitates diagnosis, reporting, and/or replacement. Inquiring procedures for compromised software and/or configuration data; performing body code or data reload/update procedures or investigating more details, including complete verification of suspected tamper-evident components with more precise details to isolate the wrong location of the component.

根據成功驗證功能性的等級,可以提供對平臺上資源的不同的存取(例如通過PIPE)。如果元件的完整性校驗失敗,則它不會被信任。該檢測到的失敗可以被安全地標記並指示給網路(或者顯式或者隱式地),以及由於該失敗條件,啟動流程會產生分支。這種類型的完整性校驗失敗可以當做執行流程失敗,借此經過校驗的組件不能被信任,並且啟動該元件會導致執行中出現惡意的、損害的、 錯誤的或者不正確配置的代碼,並且這還會引起裝置以非特定的和不可預料的形式執行功能。這樣,新組件和可用功能性的載入會受先前載入的組件的完整性的影響。 Depending on the level of successful verification functionality, different access to resources on the platform can be provided (eg, via PIPE). If the component's integrity check fails, it will not be trusted. The detected failure can be safely flagged and indicated to the network (either explicitly or implicitly), and due to the failure condition, the startup process will branch. This type of integrity check failure can be considered as an execution process failure, whereby the verified component cannot be trusted, and launching the component can result in malicious, damaging, Wrong or incorrectly configured code, and this also causes the device to perform functions in a non-specific and unpredictable form. In this way, the loading of new components and available functionality is affected by the integrity of previously loaded components.

因此,執行環境可以根據每一個啟動階段和每一個即時程序中的控制執行程序和存取特權進行改變。例如,在啟動程序的每一階段,需要根據當時進行的完整性測量做出決定。隨後的階段和策略會通過超出了執行階段(狀態、變數、參數、寄存器、檔等)的儲存或者資訊傳輸的任何可用安全方法而使用傳遞自先前階段的資訊,以確定它自己的操作。例如,上層應用認證功能可以使用先前載入的元件的完整性資訊來確定它自己的操作,包括對外部實體成功認證所需要的密鑰釋放進行門控。 Therefore, the execution environment can be changed according to the control execution program and access privileges in each startup phase and each immediate program. For example, at each stage of the startup process, a decision needs to be made based on the integrity measurements made at the time. Subsequent phases and strategies use information passed from previous stages to determine its own operations through any available security method that exceeds the storage or information transfer of the execution phase (state, variables, parameters, registers, files, etc.). For example, the upper application authentication function can use the integrity information of previously loaded components to determine its own operations, including gating the key release required for successful authentication of external entities.

一個PIPE功能流程的實例可以包括以下的一個或多個。RoT會被校驗並且它的完整性會被驗證。基線TrE可以由RoT進行檢驗,並且它的完整性會被驗證。如果TrE校驗中存在失敗,則會執行以下的一個或者多個:阻止對附著到網路所需要的密鑰的釋放;向網路觸發警告(可以載入回退代碼,這可以讓警告發送到網路和/或該警告會觸發遠端主體更新程序來取代TrE);或者將裝置電力降低。可以載入基本通信連接性代碼,這可以包括以下一個或者多個:校驗和載入基線作業系統模組;校驗和載入基線管理用戶端;或者校驗和載入通信模組。如果發生失敗,會執行以下一個或多個:阻止對附著到網路所需要的密鑰的釋放;通過警告觸發主體更新程序以取代元件(可以載 入回退代碼,這可以讓警告發送到網路和/或該警告會觸發遠端主體更新程序來取代基本代碼);發起警告和遠端組件更新程序;或者將裝置電力降低。校驗和載入剩餘作業系統和管理用戶端元件。校驗和載入動態的、可重新定位的和/或可重新載入的功能模組,且如果出現失敗,會執行以下一個或多個:阻止對附著到網路所需要的密鑰的釋放;通過到網路的協定發送失敗報告(失敗報告會指示由網路遠端更新的失敗的組件);發送警告以及請求遠端組件更新程序;或者將裝置電力降低。 An example of a PIPE functional flow can include one or more of the following. The RoT will be verified and its integrity will be verified. The baseline TrE can be verified by RoT and its integrity will be verified. If there is a failure in the TrE check, one or more of the following are executed: blocking the release of the key needed to attach to the network; triggering a warning to the network (a fallback code can be loaded, which allows the warning to be sent Go to the network and / or this warning will trigger the remote body update program to replace the TrE); or reduce the device power. The basic communication connectivity code can be loaded, which can include one or more of the following: checksum loading the baseline operating system module; checksum loading the baseline management client; or verifying and loading the communication module. If a failure occurs, one or more of the following are performed: blocking the release of the key required to attach to the network; triggering the principal update procedure to replace the component by a warning (can be loaded Entering a fallback code, which can cause a warning to be sent to the network and/or the warning will trigger a remote body update to replace the base code); initiate a warning and remote component update; or reduce the device power. The checksum loads the remaining operating system and manages the client components. Checksum loads dynamic, relocatable, and/or reloadable function modules, and if a failure occurs, one or more of the following are performed: Blocking the release of keys needed to attach to the network Send a failure report through an agreement to the network (failure report will indicate failed components updated by the remote end of the network); send a warning and request remote component update program; or reduce device power.

PIPE的行動會根據成功驗證的啟動鏈而變化。在啟動程序的每一個階段中,需要根據已經應用了的策略以及基礎平臺的部分或者整個的評估的完整性做出決定,平臺那時(或那時之前)已經被進行了完整性校驗。這些策略可以根據獲得的信任程度採用新策略或者被新的策略替代。執行環境可以根據每一啟動階段的控制策略而改變。隨後的階段和策略會通過資訊傳輸或者儲存可用的安全方法使用先前階段通過的資訊,這些方法超出了執行階段(狀態、變數、參數、寄存器、檔等)。PIPE策略可以用一個或者多個利益相關方提供。例如,一個利益相關方可能具有對於每一個策略的存取,每一個利益相關方可存取到一些策略(例如,依賴於優先層次或者與特定的功能相關聯)等。作為另一個實例,製造商可以控制低級別的代碼策略,營運商可以控制軟體和配置策略,以及應用服務提供商可以控制高級別的功能模組。 PIPE actions will vary based on the successful validation of the startup chain. At each stage of the launch process, decisions need to be made based on the policies that have been applied and the integrity of the partial or overall evaluation of the underlying platform, which has been integrity checked at that time (or before). These strategies can be adopted by new strategies or replaced by new ones depending on the level of trust gained. The execution environment can be changed according to the control strategy of each startup phase. Subsequent phases and strategies use the information passed in the previous phase through information transfer or storage of available security methods that are beyond the execution phase (status, variables, parameters, registers, files, etc.). PIPE strategies can be provided by one or more stakeholders. For example, a stakeholder may have access to each policy, and each stakeholder may have access to some policies (eg, depending on the priority level or associated with a particular function). As another example, manufacturers can control low-level code policies, operators can control software and configuration policies, and application service providers can control high-level functional modules.

雖然上面以特定的組合描述了特徵和元件,但是本領域普通技術人員可以理解,每個特徵或元件可以單獨的使用或與其他的特徵和元件進行組合使用。此外,這裏描述的方法可以用電腦程式、軟體或韌體實現,其可併入由通用電腦或處理器執行的電腦可讀媒體中。電腦可讀媒體的示例包括電子信號(在有線或無線連接上傳送)和電腦可讀儲存媒體。電腦可讀儲存媒體的示例包括,但不限於,唯讀記憶體(ROM)、隨機存取記憶體(RAM)、暫存器、快取記憶體、半導體記憶體裝置、磁性媒體(例如內部硬碟和可移動磁片),磁光媒體和光媒體(例如CD-ROM盤,和數位通用盤(DVD))。與軟體關聯的處理器用於實現射頻收發器,用於WTRU、UE、終端、基地台、RNC或任何主電腦。 Although features and elements are described above in particular combinations, those of ordinary skill in the art will understand that each feature or element can be used alone or in combination with other features and elements. Moreover, the methods described herein can be implemented in a computer program, software or firmware, which can be incorporated into a computer readable medium executed by a general purpose computer or processor. Examples of computer readable media include electronic signals (transmitted over a wired or wireless connection) and computer readable storage media. Examples of computer readable storage media include, but are not limited to, read only memory (ROM), random access memory (RAM), scratchpad, cache memory, semiconductor memory device, magnetic media (eg, internal hard) Discs and removable magnetic disks), magneto-optical media and optical media (such as CD-ROM discs, and digital versatile discs (DVD)). The processor associated with the software is used to implement a radio frequency transceiver for a WTRU, UE, terminal, base station, RNC, or any host computer.

上述實施例僅係為了方便說明而舉例,雖遭熟悉本技藝之人士任施匠思而為諸般修飾,然皆不脫如附申請專利範圍所欲保護者。 The above-described embodiments are merely examples for the convenience of the description, and those skilled in the art will be modified as described above, and are not intended to be protected as claimed.

Claims (28)

安全地啟動一裝置的裝置,該裝置包括:在該裝置上執行將被載入及將被啟動的一第一代碼的一完整性測量;基於(1)一安全地儲存於該裝置內的一根裝置唯一秘密密鑰以及(2)該第一代碼的該完整性測量,來生成一第一密鑰,其中當該第一代碼的該完整性測量為有效時,該第一密鑰為有效;以及在該裝置上將被處理的資料、在該裝置上的本地儲存的資料,以及與一外部實體的資料通信的至少一者上使用該第一密鑰執行加密操作。 A device for safely activating a device, the device comprising: performing an integrity measurement on a first code to be loaded and to be activated on the device; based on (1) a securely stored in the device a root device unique secret key and (2) the integrity measure of the first code to generate a first key, wherein the first key is valid when the integrity measure of the first code is valid And performing an encryption operation using the first key on at least one of data to be processed on the device, locally stored material on the device, and data communication with an external entity. 如申請專利範圍第1項所述的方法,更包括:在該裝置上執行被載入及被啟動的一第二代碼的一完整性測量;基於(1)該第一代碼以及(2)該第二代碼的該完整性測量,來生成一第二密鑰,其中當該第一代碼與該第二代碼的完整性測量為有效時,該第二密鑰為有效;以及在該裝置上將被處理的資料、在該裝置上本地儲存的資料,以及與一外部實體的資料通信的至少一者上使用該第二密鑰執行加密操作。 The method of claim 1, further comprising: performing an integrity measurement of a second code loaded and activated on the device; based on (1) the first code and (2) The integrity measure of the second code to generate a second key, wherein the second key is valid when the integrity of the first code and the second code is determined to be valid; and The encryption operation is performed using the second key on at least one of the processed material, the material stored locally on the device, and the material communication with an external entity. 如申請專利範圍第1項所述的方法,其中:該第一代碼是在該裝置使用信任的一不可改變的根而安全地啟動之後被第一載入的代碼; 安全地儲存於該裝置上的該根裝置唯一秘密密鑰僅對於執行該第一密鑰的所述生成的該密鑰導出功能為可存取;在生成該第一密鑰之後,該根裝置唯一秘密密鑰被做成對於該裝置的任何元件為不可存取;以及該第一密鑰對於該第一代碼為可存取。 The method of claim 1, wherein: the first code is a code that is first loaded after the device is securely launched using an unchangeable root of trust; The root device unique secret key securely stored on the device is only accessible to the key derivation function performing the generation of the first key; after generating the first key, the root device The unique secret key is made inaccessible to any element of the device; and the first key is accessible to the first code. 如申請專利範圍第1項所述的方法,其中該第一密鑰是使用一單向密鑰導出功能而被生成。 The method of claim 1, wherein the first key is generated using a one-way key derivation function. 如申請專利範圍第2項所述的方法,其中該第二密鑰是使用一單向密鑰導出功能而被生成。 The method of claim 2, wherein the second key is generated using a one-way key derivation function. 如申請專利範圍第1項所述的方法,其中:從該第一密鑰生成第一證書,該第一證書包括包含一第一公共密鑰與一第一私有秘鑰的一第一非對稱密鑰對,其中該第一非對稱密鑰對關聯於該第一代碼的該完整性測量;以及在該裝置上將被處理的資料、在該裝置上本地儲存的資料,以及與一外部實體的資料通信的至少一者上使用該第一證書執行加密操作。 The method of claim 1, wherein: generating a first certificate from the first key, the first certificate comprising a first asymmetric key comprising a first public key and a first private key a pair of keys, wherein the first asymmetric key pair is associated with the integrity measure of the first code; and data to be processed on the device, data stored locally on the device, and an external entity The first certificate is used to perform an encryption operation on at least one of the data communications. 如申請專利範圍第6項所述的方法,更包括:以與一裝置認證相關的一私有密鑰簽名該第一公共密鑰,並由一值得信任的實體發送該已被簽名的公共密鑰用於訊標或認證生成;以及接收包含該第一公共密鑰以及被該值得信任的實體簽名的一訊標或其他認證。 The method of claim 6, further comprising: signing the first public key with a private key associated with a device authentication, and transmitting the signed public key by a trusted entity Used for beaconing or authentication generation; and receiving a beacon or other authentication that includes the first public key and is signed by the trusted entity. 如申請專利範圍第7項所述的方法,更包括:利用該被簽名的第一公共密鑰以發送該第一代碼的該完整性測量、該裝置認證、該裝置的一身份、以及與該裝置認證相關的一公共密鑰的至少一者。 The method of claim 7, further comprising: using the signed first public key to transmit the integrity measure of the first code, the device authentication, an identity of the device, and the At least one of a public key associated with the device authentication. 如申請專利範圍第2項所述的方法,其中:從該第二密鑰生成第二證書,該第二證書包括包含一第二公共密鑰與一第二私有秘鑰的一第二非對稱密鑰對,其中該第二非對稱密鑰對關聯於該第二代碼的該完整性測量;以及在該裝置上將被處理的資料、在該裝置上的本地儲存的資料,以及與一外部實體的資料通信的至少一者上使用該第二證書執行加密操作。 The method of claim 2, wherein: generating a second certificate from the second key, the second certificate comprising a second asymmetric key comprising a second public key and a second private key a pair of keys, wherein the second asymmetric key pair is associated with the integrity measure of the second code; and data to be processed on the device, locally stored material on the device, and an external entity The second certificate is used to perform an encryption operation on at least one of the data communications. 如申請專利範圍第9項所述的方法,更包括:由一值得信任的實體發送該第二代碼的該完整性測量與該第二公共密鑰用於訊標或認證生成;以及接收包含該第二公共密鑰以及被該值得信任的實體簽名的一訊標或裝置認證。 The method of claim 9, further comprising: transmitting, by the trusted entity, the integrity measure of the second code and the second public key for signal or authentication generation; and receiving the The second public key and a beacon or device authentication signed by the trusted entity. 如申請專利範圍第2項所述的方法,更包括:在生成該第二密鑰之後,刪除相關於該第二密鑰的該生成的資料,包括用於該第二代碼的該完整性測量;載入並啟動該第二代碼;傳遞該裝置的控制至該第二代碼;以及其中,該第二密鑰對該第二代碼為可存取。 The method of claim 2, further comprising: deleting the generated data related to the second key after generating the second key, including the integrity measurement for the second code Loading and starting the second code; passing control of the device to the second code; and wherein the second key is accessible to the second code. 如申請專利範圍第1項所述的方法,其中該第一代碼包 括可執行代碼與資料。 The method of claim 1, wherein the first code package Includes executable code and documentation. 如申請專利範圍第2項所述的方法,其中該第二代碼包括可執行代碼與資料。 The method of claim 2, wherein the second code comprises executable code and data. 如申請專利範圍第1項所述的方法,更包括在生成該第一密鑰之後,刪除相關於該第一密鑰的該生成的資料、包括用於該第一代碼的該完整性測量;載入並啟動該第一代碼;傳遞該裝置的控制至該第一代碼;以及其中,該第一密鑰對該第一代碼為可存取的。 The method of claim 1, further comprising deleting the generated data related to the first key, including the integrity measure for the first code, after generating the first key; Loading and starting the first code; passing control of the device to the first code; and wherein the first key is accessible to the first code. 一種包括一處理器與一記憶體的裝置,該記憶體儲存了電腦可執行指示,當該電腦可執行指示被該處理器執行時,該電腦可執行指示使該裝置執行操作,包括:在該裝置上執行將被載入及將被啟動的一第一代碼的一完整性測量;基於(1)一安全地儲存於該裝置內的一根裝置唯一秘密密鑰以及(2)該第一代碼的該完整性測量,來生成一第一密鑰,其中當該第一代碼的該完整性測量為有效時,該第一密鑰為有效;以及在該裝置上將被處理的資料、在該裝置上的本地儲存的資料,以及與一外部實體的資料通信的至少一者上使用該第一密鑰執行加密操作。 A device comprising a processor and a memory, the memory storing a computer executable indication, the computer executable instruction causing the device to perform an operation when the computer executable instruction is executed by the processor, comprising: Performing on the device an integrity measurement of a first code to be loaded and to be initiated; based on (1) a device unique secret key securely stored in the device and (2) the first code The integrity measure to generate a first key, wherein the first key is valid when the integrity measure of the first code is valid; and the data to be processed on the device is The encryption operation is performed using the first key on at least one of locally stored material on the device and data communication with an external entity. 如申請專利範圍第15項所述的裝置,其中當該指示被該處理器執行時,使該裝置執行更多的操作,包括:在該裝置上執行將被載入及將被啟動的一第二代碼 的一完整性測量;基於(1)該第一代碼以及(2)該第二代碼的該完整性測量,來生成一第二密鑰,其中當該第一代碼與該第二代碼的完整性測量為有效時,該第二密鑰為有效;以及在該裝置上將被處理的資料、在該裝置上本地儲存的資料,以及與一外部實體的資料通信的至少一者上使用該第二密鑰執行加密操作。 The device of claim 15, wherein when the indication is executed by the processor, the device is caused to perform more operations, including: executing, on the device, a first to be loaded and to be activated Two code An integrity measure; generating a second key based on (1) the first code and (2) the integrity measure of the second code, wherein when the first code and the second code are integrity The second key is valid when the measurement is valid; and the second is used on at least one of the device to be processed on the device, the data stored locally on the device, and the data communicated with an external entity The key performs an encryption operation. 如申請專利範圍第15項所述的裝置,其中:該第一代碼是在該裝置使用信任的一不可改變的根而安全地啟動之後被第一載入的代碼;安全地儲存於該裝置上的該根裝置唯一秘密密鑰僅對於執行該第一密鑰的所述生成的該密鑰導出功能為可存取;在生成該第一密鑰之後,該根裝置唯一秘密密鑰被做成對於該裝置的任何元件為不可存取;以及該第一密鑰對於該第一代碼為可存取。 The device of claim 15 wherein: the first code is code that is first loaded after the device is securely activated using an unalterable root of trust; is securely stored on the device The root device unique secret key is only accessible to the key derivation function that performs the generation of the first key; after generating the first key, the root device unique secret key is made Any element of the device is inaccessible; and the first key is accessible to the first code. 如申請專利範圍第15項所述的裝置,其中該第一密鑰是使用一單向密鑰導出功能而被生成。 The apparatus of claim 15, wherein the first key is generated using a one-way key derivation function. 如申請專利範圍第16項所述的裝置,其中該第二密鑰是使用一單向密鑰導出功能而被生成。 The apparatus of claim 16, wherein the second key is generated using a one-way key derivation function. 如申請專利範圍第15項所述的裝置,其中當該指示被該處理器執行時,使該裝置執行更多的操作,包括:從該第一密鑰生成第一證書,該第一證書包括包含一第一公共密鑰與一第一私有秘鑰的一第一非對稱密 鑰對,其中該第一非對稱密鑰對關聯於該第一代碼的該完整性測量;以及在該裝置上將被處理的資料、在該裝置上本地儲存的資料,以及與一外部實體的資料通信的至少一者上使用該第一證書執行加密操作。 The device of claim 15, wherein when the indication is executed by the processor, causing the device to perform more operations comprises: generating a first certificate from the first key, the first certificate comprising a first asymmetric key comprising a first public key and a first private key a pair of keys, wherein the first asymmetric key pair is associated with the integrity measure of the first code; and data to be processed on the device, data stored locally on the device, and an external entity The first certificate is used to perform an encryption operation on at least one of the data communications. 如申請專利範圍第20項所述的裝置,其中該指示被該處理器執行時,使該裝置執行更多的操作,包括:以與一裝置認證相關的一私有密鑰簽名該第一公共密鑰,並由一值得信任的實體發送該已被簽名的公共密鑰用於訊標或認證生成;以及接收包含該第一公共密鑰以及被一值得信任的實體簽名的一訊標或其他認證。 The apparatus of claim 20, wherein when the indication is executed by the processor, causing the apparatus to perform more operations, comprising: signing the first public key with a private key associated with a device authentication Key, and the signed public key is sent by a trusted entity for beaconing or authentication generation; and receiving a beacon or other authentication that includes the first public key and is signed by a trusted entity . 如申請專利範圍第21項所述的裝置,其中該指示被該處理器執行時,使該裝置執行更多的操作,包括:利用該被簽名的第一公共密鑰以發送該第一代碼的該完整性測量、該裝置認證、該裝置的一身份、以及與該裝置認證相關的一公共密鑰的至少一者。 The apparatus of claim 21, wherein when the indication is executed by the processor, causing the apparatus to perform more operations, comprising: using the signed first public key to transmit the first code At least one of the integrity measure, the device authentication, an identity of the device, and a public key associated with the device authentication. 如申請專利範圍第16項所述的裝置,其中該指示被該處理器執行時,使該裝置執行更多的操作,包括:從該第二密鑰生成第二證書,該第二證書包括包含一第二公共密鑰與一第二私有秘鑰的一第二非對稱密鑰對,其中該第二非對稱密鑰對關聯於該第二代碼的該完整性測量;以及在該裝置上將被處理的資料、在該裝置上的本地儲 存的資料,以及與一外部實體的資料通信的至少一者上使用該第二證書執行加密操作。 The apparatus of claim 16, wherein the apparatus, when executed by the processor, causes the apparatus to perform more operations, comprising: generating a second certificate from the second key, the second certificate comprising a second asymmetric key pair of a second public key and a second private key, wherein the second asymmetric key pair is associated with the integrity measure of the second code; and on the device Processed data, local storage on the device The stored data and the second certificate are used to perform an encryption operation on at least one of the data communication with an external entity. 如申請專利範圍第23項所述的裝置,其中該指示被該處理器執行時,使該裝置執行更多的操作,包括:由一值得信任的實體發送該第二代碼的該完整性測量與該第二公共密鑰用於訊標或認證生成;以及接收包含該第二公共密鑰以及被該值得信任的實體簽名的一訊標或裝置認證。 The device of claim 23, wherein the indication is executed by the processor, causing the device to perform more operations, comprising: transmitting the integrity measure of the second code by a trusted entity The second public key is used for beaconing or authentication generation; and receiving a beacon or device authentication that includes the second public key and is signed by the trusted entity. 如申請專利範圍第16項所述的裝置,其中該指示被該處理器執行時,使該裝置執行更多的操作,包括:在生成該第二密鑰之後,刪除相關於該第二密鑰的該生成的資料,包括用於該第二代碼的該完整性測量;載入並啟動該第二代碼;傳遞該裝置的控制至該第二代碼;以及其中,該第二密鑰對該第二代碼為可存取。 The device of claim 16, wherein when the indication is executed by the processor, causing the device to perform more operations, comprising: deleting the second key after generating the second key The generated data, including the integrity measure for the second code; loading and starting the second code; passing control of the device to the second code; and wherein the second key is The second code is accessible. 如申請專利範圍第15項所述的裝置,其中該第一代碼包括可執行代碼與資料。 The device of claim 15, wherein the first code comprises executable code and data. 如申請專利範圍第16項所述的裝置,其中該第二代碼包括可執行代碼與資料。 The device of claim 16, wherein the second code comprises executable code and data. 如申請專利範圍第15項所述的裝置,其中該指示被該處理器執行時,使該裝置執行更多的操作,包括:在生成該第一密鑰之後,刪除相關於該第一密鑰的該生成的資料、包括用於該第一代碼的該完整性測量;載入並啟動該第一代碼; 傳遞該裝置的控制至該第一代碼;以及其中,該第一密鑰對該第一代碼為可存取的。 The device of claim 15, wherein when the indication is executed by the processor, causing the device to perform more operations, comprising: deleting the first key after generating the first key The generated data, including the integrity measure for the first code; loading and starting the first code; Passing control of the device to the first code; and wherein the first key is accessible to the first code.
TW106105484A 2010-04-12 2011-04-12 Staged control release in boot process TW201741925A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US32324810P 2010-04-12 2010-04-12
US35747410P 2010-06-22 2010-06-22

Publications (1)

Publication Number Publication Date
TW201741925A true TW201741925A (en) 2017-12-01

Family

ID=44280970

Family Applications (3)

Application Number Title Priority Date Filing Date
TW100112591A TWI584625B (en) 2010-04-12 2011-04-12 Network device and method to perform integrity validation of network device
TW106105484A TW201741925A (en) 2010-04-12 2011-04-12 Staged control release in boot process
TW105107632A TW201628368A (en) 2010-04-12 2011-04-12 Staged control release in boot process

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW100112591A TWI584625B (en) 2010-04-12 2011-04-12 Network device and method to perform integrity validation of network device

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW105107632A TW201628368A (en) 2010-04-12 2011-04-12 Staged control release in boot process

Country Status (9)

Country Link
US (3) US8856941B2 (en)
EP (1) EP2558972A1 (en)
JP (3) JP5647332B2 (en)
KR (2) KR20130020734A (en)
CN (2) CN105468982A (en)
CA (1) CA2796331A1 (en)
SG (1) SG184853A1 (en)
TW (3) TWI584625B (en)
WO (1) WO2011130211A1 (en)

Families Citing this family (68)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012520027A (en) 2009-03-06 2012-08-30 インターデイジタル パテント ホールディングス インコーポレイテッド Verification and management of wireless device platforms
US20100325446A1 (en) * 2009-06-19 2010-12-23 Joseph Martin Mordetsky Securing Executable Code Integrity Using Auto-Derivative Key
CN101909058B (en) * 2010-07-30 2013-01-16 天维讯达无线电设备检测(北京)有限责任公司 Platform authentication strategy management method and system suitable for credible connecting architecture
CN106055930A (en) * 2010-11-05 2016-10-26 交互数字专利控股公司 Device validation and distress indication
WO2013012436A1 (en) * 2011-07-18 2013-01-24 Hewlett-Packard Development Company, L.P. Reset vectors for boot instructions
EP4322465A3 (en) * 2011-12-15 2024-04-17 Daedalus Prime LLC Method and device for secure communications over a network using a hardware security engine
US10085207B2 (en) * 2012-01-27 2018-09-25 Intel Corporation Techniques for improved energy-savings management
US20150030153A1 (en) * 2012-02-09 2015-01-29 Intel Corporation Repeatable application-specific encryption key derivation using a hidden root key
US20140281539A1 (en) * 2012-03-30 2014-09-18 Goldman, Sachs & Co. Secure Mobile Framework With Operating System Integrity Checking
US9130837B2 (en) * 2012-05-22 2015-09-08 Cisco Technology, Inc. System and method for enabling unconfigured devices to join an autonomic network in a secure manner
US9038179B2 (en) 2012-08-28 2015-05-19 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Secure code verification enforcement in a trusted computing device
US9367335B2 (en) 2013-07-12 2016-06-14 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. State dependent optimization for sequential booting of heterogeneous systems
US9141373B2 (en) * 2013-07-31 2015-09-22 Arista Networks, Inc. System and method for accelerated software upgrades
US20150078550A1 (en) * 2013-09-13 2015-03-19 Microsoft Corporation Security processing unit with configurable access control
US9633210B2 (en) 2013-09-13 2017-04-25 Microsoft Technology Licensing, Llc Keying infrastructure
US20150127930A1 (en) * 2013-11-06 2015-05-07 Seagate Technology Llc Authenticated device initialization
US9959106B2 (en) * 2013-11-14 2018-05-01 International Business Machines Corporation Sharing of portable initialized objects between computing platforms
WO2015072788A1 (en) * 2013-11-14 2015-05-21 Samsung Electronics Co., Ltd. Method and apparatus for managing security key in a near fieldd2d communication system
JP6265783B2 (en) * 2014-03-06 2018-01-24 キヤノン株式会社 Encryption / decryption system, control method therefor, and program
US20150286823A1 (en) * 2014-04-07 2015-10-08 Qualcomm Incorporated System and method for boot sequence modification using chip-restricted instructions residing on an external memory device
US9195831B1 (en) 2014-05-02 2015-11-24 Google Inc. Verified boot
EP3149882A4 (en) * 2014-06-02 2017-12-13 Sncr, Llc Secure mobile framework with operating system integrity checking
US10057240B2 (en) * 2014-08-25 2018-08-21 Sap Se Single sign-on to web applications from mobile devices
US10097513B2 (en) 2014-09-14 2018-10-09 Microsoft Technology Licensing, Llc Trusted execution environment extensible computing device interface
US9705879B2 (en) 2014-09-17 2017-07-11 Microsoft Technology Licensing, Llc Efficient and reliable attestation
EP3657866A1 (en) * 2014-09-29 2020-05-27 Convida Wireless, LLC Service capability server / epc coordination for power savings mode and paging
US10019604B2 (en) 2014-10-31 2018-07-10 Xiaomi Inc. Method and apparatus of verifying terminal and medium
CN104484593B (en) * 2014-10-31 2017-10-20 小米科技有限责任公司 terminal verification method and device
US10129031B2 (en) * 2014-10-31 2018-11-13 Convida Wireless, Llc End-to-end service layer authentication
US20160188874A1 (en) * 2014-12-29 2016-06-30 Rubicon Labs, Inc. System and method for secure code entry point control
CN104602357B (en) * 2015-01-19 2018-03-02 国家电网公司 Multi-user dispatching method is wirelessly transferred suitable for intelligent grid
WO2016149355A1 (en) 2015-03-16 2016-09-22 Convida Wireless, Llc End-to-end authentication at the service layer using public keying mechanisms
US9798887B2 (en) * 2015-08-26 2017-10-24 Qualcomm Incorporated Computing device to securely activate or revoke a key
US10374777B2 (en) * 2015-08-31 2019-08-06 Qualcomm Incorporated Control signaling in a shared communication medium
US9916453B2 (en) 2015-12-22 2018-03-13 Qualcomm Incorporated Derived keys for execution environments in a boot chain
US11366936B2 (en) 2016-04-07 2022-06-21 Nagravision S.A. Flexible cryptographic device
US9916452B2 (en) * 2016-05-18 2018-03-13 Microsoft Technology Licensing, Llc Self-contained cryptographic boot policy validation
US10402566B2 (en) * 2016-08-01 2019-09-03 The Aerospace Corporation High assurance configuration security processor (HACSP) for computing devices
CN106529271A (en) * 2016-10-08 2017-03-22 深圳市金立通信设备有限公司 Terminal and binding check method thereof
TWI615732B (en) * 2016-12-27 2018-02-21 瑞昱半導體股份有限公司 Electronic component of electronic device, method of starting electronic device and encryption method
US10484371B2 (en) * 2017-05-22 2019-11-19 Seagate Technology Llc Device controller security system
US10666430B2 (en) * 2017-09-29 2020-05-26 Intel Corporation System and techniques for encrypting chip-to-chip communication links
US10482258B2 (en) * 2017-09-29 2019-11-19 Nxp Usa, Inc. Method for securing runtime execution flow
JP2019092134A (en) * 2017-11-17 2019-06-13 株式会社シーエスサービス Encryption key generation method
US11347861B2 (en) * 2018-04-10 2022-05-31 Raytheon Company Controlling security state of commercial off the shelf (COTS) system
CN110677250B (en) 2018-07-02 2022-09-02 阿里巴巴集团控股有限公司 Key and certificate distribution method, identity information processing method, device and medium
WO2020010515A1 (en) * 2018-07-10 2020-01-16 Apple Inc. Identity-based message integrity protection and verification for wireless communication
CN110795774B (en) 2018-08-02 2023-04-11 阿里巴巴集团控股有限公司 Measurement method, device and system based on trusted high-speed encryption card
CN110795742B (en) 2018-08-02 2023-05-02 阿里巴巴集团控股有限公司 Metric processing method, device, storage medium and processor for high-speed cryptographic operation
US10740084B2 (en) * 2018-08-16 2020-08-11 Intel Corporation Soc-assisted resilient boot
CN110874478B (en) * 2018-08-29 2023-05-02 阿里巴巴集团控股有限公司 Key processing method and device, storage medium and processor
US11423150B2 (en) 2018-09-07 2022-08-23 Raytheon Company System and method for booting processors with encrypted boot image
EP3647983A1 (en) * 2018-10-30 2020-05-06 Siemens Aktiengesellschaft Device and operation method for checking operational data of a secured start operating phase of a device, in particular a device usable in an industrial system environment
US10841160B2 (en) 2018-11-08 2020-11-17 Arista Networks, Inc. System and method for processing messages during a reboot of a network device
EP3664358A1 (en) * 2018-12-03 2020-06-10 Nagravision S.A. Methods and devices for remote integrity verification
US11012425B2 (en) * 2018-12-28 2021-05-18 Micron Technology, Inc. Replay protection nonce generation
FR3094520B1 (en) * 2019-03-25 2021-10-22 St Microelectronics Rousset Encryption and / or decryption key
WO2020205497A1 (en) 2019-04-01 2020-10-08 Raytheon Company Root of trust assisted access control of secure encrypted drives
WO2020205507A1 (en) 2019-04-01 2020-10-08 Raytheon Company Adaptive, multi-layer enterprise data protection & resiliency platform
US11379588B2 (en) 2019-12-20 2022-07-05 Raytheon Company System validation by hardware root of trust (HRoT) device and system management mode (SMM)
TWI737368B (en) * 2020-06-29 2021-08-21 財團法人國家實驗研究院 System and method for analyzing confidential data
IL275947A (en) * 2020-07-09 2022-02-01 Google Llc Anonymous event attestation
CN113254372A (en) * 2020-08-07 2021-08-13 广东高云半导体科技股份有限公司 Method and system for providing a programmable microcontroller with a two-stage configuration process
US20220129259A1 (en) * 2020-10-26 2022-04-28 Micron Technology, Inc. Endpoint Customization via Online Firmware Store
US20220222348A1 (en) * 2021-01-13 2022-07-14 Microsoft Technology Licensing, Llc Attesting update of a firmware layer
US11831688B2 (en) * 2021-06-18 2023-11-28 Capital One Services, Llc Systems and methods for network security
US20230064398A1 (en) * 2021-08-27 2023-03-02 Dell Products L.P. Uefi extensions for analysis and remediation of bios issues in an information handling system
WO2023048706A1 (en) * 2021-09-22 2023-03-30 Hewlett-Packard Development Company, L.P. Emulated network response

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2779018B1 (en) * 1998-05-22 2000-08-18 Activcard TERMINAL AND SYSTEM FOR IMPLEMENTING SECURE ELECTRONIC TRANSACTIONS
EP1161715B1 (en) * 1999-02-15 2010-08-18 Hewlett-Packard Company (a Delaware Corporation) Communications between modules of a computing apparatus
EP1126655A1 (en) * 2000-02-15 2001-08-22 Siemens Aktiengesellschaft Method of hardware and software authentication in a network system
US7325252B2 (en) * 2001-05-18 2008-01-29 Achilles Guard Inc. Network security testing
US20030028803A1 (en) * 2001-05-18 2003-02-06 Bunker Nelson Waldo Network vulnerability assessment system and method
EP1338939A1 (en) 2002-02-22 2003-08-27 Hewlett-Packard Company State validation device for a computer
US20050283601A1 (en) * 2004-06-22 2005-12-22 Sun Microsystems, Inc. Systems and methods for securing a computer boot
US7694121B2 (en) * 2004-06-30 2010-04-06 Microsoft Corporation System and method for protected operating system boot using state validation
US8160244B2 (en) * 2004-10-01 2012-04-17 Broadcom Corporation Stateless hardware security module
US8166296B2 (en) * 2004-10-20 2012-04-24 Broadcom Corporation User authentication system
US8281132B2 (en) * 2004-11-29 2012-10-02 Broadcom Corporation Method and apparatus for security over multiple interfaces
US20060190391A1 (en) * 2005-02-11 2006-08-24 Cullen Andrew A Iii Project work change in plan/scope administrative and business information synergy system and method
KR100670005B1 (en) 2005-02-23 2007-01-19 삼성전자주식회사 Apparatus for verifying memory integrity remotely for mobile platform and system thereof and method for verifying integrity
WO2006093284A1 (en) 2005-03-04 2006-09-08 Vodafone K.K. Value information output method and mobile communication terminal apparatus
WO2006115984A2 (en) * 2005-04-21 2006-11-02 Securedpay Solutions, Inc. Portable handheld device for wireless order entry and real time payment authorization and related methods
US8285988B2 (en) * 2006-05-09 2012-10-09 Broadcom Corporation Method and system for command authentication to achieve a secure interface
EP1855476A3 (en) * 2006-05-11 2010-10-27 Broadcom Corporation System and method for trusted data processing
CN101410847B (en) * 2006-06-30 2011-11-09 国际商业机器公司 Message handling method at a mobile device, mobile device and smart card
US8136162B2 (en) * 2006-08-31 2012-03-13 Broadcom Corporation Intelligent network interface controller
JP5116325B2 (en) 2007-03-15 2013-01-09 株式会社リコー Information processing apparatus, software update method, and image processing apparatus
US8984265B2 (en) * 2007-03-30 2015-03-17 Intel Corporation Server active management technology (AMT) assisted secure boot
WO2009020789A2 (en) * 2007-08-03 2009-02-12 Interdigital Patent Holdings, Inc. Security procedure and apparatus for handover in a 3gpp long term evolution system
US8782801B2 (en) * 2007-08-15 2014-07-15 Samsung Electronics Co., Ltd. Securing stored content for trusted hosts and safe computing environments
WO2009044533A1 (en) * 2007-10-05 2009-04-09 Panasonic Corporation Secure boot terminal, secure boot method, secure boot program, recording medium, and integrated circuit
US8683213B2 (en) * 2007-10-26 2014-03-25 Qualcomm Incorporated Progressive boot for a wireless device
KR101591508B1 (en) * 2008-04-14 2016-02-18 코닌클리케 필립스 엔.브이. A method for distributing encryption means
KR101508576B1 (en) 2008-09-24 2015-04-08 인터디지탈 패튼 홀딩스, 인크 Home node-b apparatus and security protocols

Also Published As

Publication number Publication date
JP2013524385A (en) 2013-06-17
SG184853A1 (en) 2012-11-29
US9679142B2 (en) 2017-06-13
WO2011130211A1 (en) 2011-10-20
CN105468982A (en) 2016-04-06
JP2015035831A (en) 2015-02-19
CN102844764A (en) 2012-12-26
TW201628368A (en) 2016-08-01
US20170277895A1 (en) 2017-09-28
TWI584625B (en) 2017-05-21
JP2017022781A (en) 2017-01-26
KR20120130793A (en) 2012-12-03
US20110302638A1 (en) 2011-12-08
TW201202999A (en) 2012-01-16
US20150026471A1 (en) 2015-01-22
KR101523420B1 (en) 2015-05-27
US8856941B2 (en) 2014-10-07
EP2558972A1 (en) 2013-02-20
KR20130020734A (en) 2013-02-27
CN102844764B (en) 2015-12-16
CA2796331A1 (en) 2011-10-20
JP5647332B2 (en) 2014-12-24

Similar Documents

Publication Publication Date Title
TWI584625B (en) Network device and method to perform integrity validation of network device
JP5390619B2 (en) HOMENODE-B device and security protocol
JP6231054B2 (en) Verification and management of wireless device platforms
KR101038064B1 (en) Authenticating an application
WO2009046400A1 (en) Techniques for secure channelization between uicc and a terminal
WO2022090813A1 (en) Verification of authenticity of a user equipment using puf